Quantcast

Technology and Covert Operations

Covert Operations has long relied on a mix of the most current technology available, and the need for an “old-school,” hands-on approach. No covert operative worth his salt would rely entirely on technology, as opening up an operation to an easy hack is almost the first danger one is warned against in training. I ran […]

The State of Data Privacy, Then and Now

Who knew that the privacy of one’s personal information would become a variable? Our parents admonished us not to write anything in a letter or note to another that we would not be comfortable seeing on the front page of The Wall Street Journal. We were well schooled in the art of bifurcating our lives […]