1. Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".

    Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".

    113
    1
    5.48K
    24
  2. Lying about national cybersecurity & Cyberbiosecurity is bad mm’kay

    Lying about national cybersecurity & Cyberbiosecurity is bad mm’kay

    82
    3
    3.9K
    14
  3. DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    19
    0
    3.01K
    2
  4. Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    23
    0
    2.95K
    15
  5. Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    20
    0
    2.73K
    11
  6. Dominion voting machines can access the internet. Why lie? * Aug. 11, 2021

    Dominion voting machines can access the internet. Why lie? * Aug. 11, 2021

    14
    0
    328
    2
  7. Latest ‘Drain-The-Swamp’ News - Wednesday, 18th of November - Morning Coffee Edition

    Latest ‘Drain-The-Swamp’ News - Wednesday, 18th of November - Morning Coffee Edition

    225
    2
    2.04K
    15
  8. Your Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) - Cybersecurity

    Your Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) - Cybersecurity

    164
    3
    1.84K
    21
  9. National Security State Censorship, Election Interference and the Inversion of Democracy

    National Security State Censorship, Election Interference and the Inversion of Democracy

    10
    0
    1.37K
  10. CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    38
    1
    4.73K
    5
  11. How Charlie Trig's Aegis Cyber Defense is Revolutionizing Cybersecurity | | Two Mikes with Dr Michael Scheuer & Col Mike | LIVE @ 7pm ET

    How Charlie Trig's Aegis Cyber Defense is Revolutionizing Cybersecurity | | Two Mikes with Dr Michael Scheuer & Col Mike | LIVE @ 7pm ET

    471
  12. We are Being Tracked on the Internet Via Our Phone Number! Zero Anonymity

    We are Being Tracked on the Internet Via Our Phone Number! Zero Anonymity

    138
    0
    6.74K
    28
  13. Unwitting Assets Ep 2: Patrick Bergy on Attribution, Social Engineering & National Public Internet

    Unwitting Assets Ep 2: Patrick Bergy on Attribution, Social Engineering & National Public Internet

    4
    0
    335
    1
  14. DEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QA

    DEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QA

    139
    1
    11.6K
    13