Table of Contents Toggle StructureTasksCheyenne Mountain today During the cold war, the USA had reasons to fear a nuclear strike from the USSR. The moment Russians sent the Earth‘s first artificial satellite, the Americans became worried by‘ the rocket that carried the Sputnik to the ...

Table of Contents Toggle CausesHow to identify the symptoms?How to deal with it?Regulation is the best prevention The Internet has become an inherent part of our everyday life. We use it at home, at work and in travel. However, specialists claim that being online might ...

Table of Contents Toggle ReceptionSocial roomStorage roomLoading rampsLarge warehouses Running your own company might involve the necessity to install security systems e.g. in the office and adjacent warehouses. But will regular CCTV cameras be enough? You might want to consider adding some extra equipment to ...

Table of Contents Toggle Control and preventionWhat units protect the airports?Security systemsDifferent countries, different regulations Great numbers of people, both passengers and employees, come to airports all around the world. Ensuring their safety is one of the airports‘ top priorities. Let us see how it ...

Ancient Greeks, Spartans, Romans – they all practised message encryption. They would use hieroglyphics, combine several alphabets, write on pieces of leather, or build special machines for it. Nowadays, hi-tech computers handle data encryption, but in the past people had their own methods. Let us ...

Table of Contents Toggle PermafrostNoah‘s ArkWhy pick this place? Even though its name might not invoke images of a high-security facility, the Global Seed Vault definitely is one. It is a structure that makes science-fiction film scenarios a plausible vision of the future. Permafrost Svalbard ...

Table of Contents Toggle 100 yearsWho was responsible? Who was the first hacker? When was the term ‘hacking‘ coined, and does it really have to involve computers at all? It turns out that the concept of hacking is not a creation of the last couple of ...

Table of Contents Toggle How did he do it?A common practice?Secret Service In the USA, a man was recently apprehended, who, using invalid credit cards, conned Apple vendors for almost $310 thousand! How did he managed to do it?Sharron Parrish, 24, came up with an ...

Table of Contents Toggle The BeastSafety measures All heads of state take great care of their own security, but legions of bodyguards are not the only precaution they take! Every means of transportation used e.g. by presidents is extremely well protected. Let us take a ...

Table of Contents Toggle We buy more gadgetsSafe familySafe neighbourhood Surveillance cameras, microphones concealed in various appliances, phototraps and other similar gear used to be unavailable, and the Average Joe knew about it only from James Bond films. How does it look today? We buy ...

error: Content is protected !!