I recently had the chance to spend a few days in New York, New York. This was a personal trip, and I covered a lot of ground. This time, I actually managed to focus on the locks I saw, and I saw some good ones on Lock Safari NYC. I noticed some interesting things about New York’s locks.
There are several lists of OPSEC rules and commandments our there on the internet. Some of them are quite good but I wanted to write my own set of Ten OPSEC Principles.
Over the past few years I’ve been fortunate enough to do a bit of international travel. I’m also fascinated with personal security. The following are some minor “best practices” for international travel security. If you have any suggestions, post them so we can all benefit. Additionally, If I’m being foolish, please call me out.
I recently had the opportunity to explore another city in my search for rare and interesting locks. Lock Safari Salt Lake City took me through quite a few neighborhoods over a long weekend. Over three days a friend and I covered the Marmalade, 9th and 9th, Temple Square/Downtown, and Sugar House areas of SLC. I found quite a few interesting locks, but not as many as I expected from a city of this size.
A couple of weeks ago I posted my introduction to threat modeling. Several times in that post I mentioned the concept of profile elevation, and it will certainly be coming up more as I flesh out my thoughts on threat modeling. It has occurred to me that this topic should be explored more fully.
I have previously written about categorizing attackers based on their levels of skill and focus. I have also written about categorizing security measures to defeat attackers with a given level of skill or focus. Both of these posts tie in closely with (and were early attempts at) a topic that I want to explore more fully in coming months: threat modeling.
On this site I talk about a number of different security measures. Just as in my discussion of attacks and attackers it is important to have a firm understanding of security measures and exactly what type of security each provides. . . and does not provide.
In previous posts I have referenced two different types of attacks: opportunistic and focused. These categories apply to attacks of all kinds, physical and digital, an understanding them is important to fully understanding how to defend against them. This post will attempt to categorize these two types of attack and the attackers that may carry out each.
I recently had the opportunity to spend an extended weekend in Vancouver, BC. While there, I indulged my desire to run around the city and its seedier parts to look for interesting locks. “Lock Safari Vancouver” was a success – I found some very interesting stuff! This post will be divided into two parts. This first half will cover the more “pedestrian” Abloy, ASSA, and Medeco products. Part II will cover the more odd and interesting.