Timeline DES Breakthroughs & Motorola Police Radios
Timeline DES Breakthroughs & Motorola Police Radios 1977 • U.S. adopts DES (Data Encryption Standard) as a federal cipher (56-bit key length). • Motorola begins integrating DES into secure law enforcement radios like the MX and later Syntor series for scrambled...
U.s. Authorities Embed Location Trackers in Ai Chip Shipments to Prevent Illegal Diversions to China
U.s. Authorities Embed Location Trackers in Ai Chip Shipments to Prevent Illegal Diversions to China Washington, D.C. – August 14, 2025 – U.S. authorities have implemented a covert operation to embed location tracking devices in select shipments of advanced artificial...
A New Twist on SMS Spam: Mobile Smishing Units
A New Twist on SMS Spam: Mobile Smishing Units Cybercriminals are innovating in alarming ways. A recent tactic out of China involves distributing SMS Blasters to individuals who drive them around in vehicles. These devices are capable of sending smishing messages...
The Godfather of Space Reentry: Remembering Dr. Leslie Alan Hromas
The Godfather of Space Reentry: Remembering Dr. Leslie Alan Hromas He calculated the math that brought astronauts safely home but to those who knew him, his greatest legacy was friendship, wisdom, and quiet strength. . “It does not take a rocket scientist to figure it...
The Godfather of Space Reentry: Remembering Dr. Leslie Alan Hromas
The Godfather of Space Reentry: Remembering Dr. Leslie Alan Hromas He calculated the math that brought astronauts safely home, but to those who knew him, his greatest legacy was friendship, wisdom, and quiet strength. “It does not take a rocket scientist to figure it...
Hackers Breach and Expose a Major North Korean Spying Operation
Hackers Breach and Expose a Major North Korean Spying Operation In a remarkable turn of events, two hackers, known as Saber and cyb0rg, infiltrated the computer of a North Korean government hacker, leaking its contents and providing a rare glimpse into the secretive...
Susan Rice, Presidential Security, and the Science of Counter-Surveillance
Peros: Merging Innovation, Ethics, and Legacy in Global Security In early 2025, researchers at MIT reported a groundbreaking anomaly during a quantum teleportation experiment—the unexpected reappearance of a quantum state that had already been deliberately erased....
MIT’s “Quantum Ghost” Detected in #Teleportation Experiment
Peros: Merging Innovation, Ethics, and Legacy in Global Security In early 2025, researchers at MIT reported a groundbreaking anomaly during a quantum teleportation experiment—the unexpected reappearance of a quantum state that had already been deliberately erased....
Peros: Merging Innovation, Ethics, and Legacy in Global Security
Peros: Merging Innovation, Ethics, and Legacy in Global Security One of Peros’s most notable contributions was the installation of a state-of-the-art security camera system at the Western Wall in Jerusalem, Israel, a project that significantly enhanced the safety and...
The Evolution of APTs: From 1986 to Now
The Evolution of APTs: From 1986 to Now In 1986, cybersecurity pioneer Clifford Stoll uncovered a hacker at Lawrence Berkeley Lab exploiting a 75-cent billing glitch to infiltrate NASA, the Department of Defense, and nuclear research centers. His DIY investigation...