#15: Internet Traffic Cops (02/18/2010)
Organized crime on the net, and what to do about it.
Organized crime on the net, and what to do about it.
#14: Outsmarted by Breakfast (10/22/2009)
If pigs can outsmart RFIDs can players?
If pigs can outsmart RFIDs can players?
#13: Taking Advantage of Big Brother (08/20/2009)
Exploiting the weaknesses of eavesdropping software.
Exploiting the weaknesses of eavesdropping software.
#12: The Daemon in the Machine (05/21/2009)
What can computers do to people?
What can computers do to people?
#11: Hacking the Car (03/19/2009)
High-class car theft.
High-class car theft.
#10: Improvised Spy Gear (02/19/2009)
Espionage equipment you can make yourself.
Espionage equipment you can make yourself.
#9: The Liberation of Jorge Ramirez (01/22/2009)
An adventure for GURPS Ultra-Lite
An adventure for GURPS Ultra-Lite
#8: Baling Wire and Duct Tap (12/18/2008)
What it takes to solve problems on the fly.
What it takes to solve problems on the fly.
#7: Digital Deception (11/11/2008)
Planting false information ... ripped from today's headlines.
Planting false information ... ripped from today's headlines.
#6: Viruses (10/23/2008)
Computer viruses: what they do and how they do it
Computer viruses: what they do and how they do it
#5: How to Win Friends and Compromise People (09/18/2008)
About social engineering, or the con game.
About social engineering, or the con game.
#4: Encryption and Data Hiding (08/21/2008)
How and what to encrypt, and why.
How and what to encrypt, and why.
#3: Biometric Scanners (07/17/2008)
On finger print scanners, retinal scanners, and similar security systems.
On finger print scanners, retinal scanners, and similar security systems.
#2: Network Security (06/19/2008)
Realistic infiltration of computer networks.
Realistic infiltration of computer networks.
#1: Realistic Hacking (05/22/2008)
Tips for running computer system infiltration in your game.
Tips for running computer system infiltration in your game.

