About the author  ⁄ BrickHouse Security

BrickHouse Security is the industry's premier supplier of security and surveillance solutions. As a recognized authority in GPS tracking, hidden cameras, cell phone/PC monitoring, video surveillance and counter surveillance, we help our customers use technology to get the clarity they need. We proudly serve consumers, businesses of all sizes and the law enforcement community. When you need to know, BrickHouse has the answers.

The internet has provided countless individuals and businesses with a platform to speak to the general public. Anyone can create their own blog, either by registering a domain of their own, or by simply creating a user name on one of the large blog sites and posting their thoughts. If you do it well, you may be lucky enough to attract an audience of people with an interest in what you have to say. Possibly the best feeling you can get as a writer is to inspire discussions or have other outlets credit you for what you’ve posted. The most frustrating feeling, however, comes when you realize that someone is reposting your work without your permission, often times passing it off as their own.

Read More →

The current state of GPS navigation technology comes with a risk for drivers, as it requires them to take their eyes of the road and focus on the navigation screen for directions. Also, even though navigation systems usually announce when a turn is coming up, it is not as effective as someone or something showing you exactly where to go.

Read More →

We often hear of websites turning to Secure Socket Layer (SSL) encryption to protect their information from hackers. However, it seems that by having the SSL encryption, websites are putting themselves at risk for a different type of attack. Instead of having their data open to interception by hackers, the SSL comes with a vulnerability that allows the hacker to temporarily bring down the website entirely.

Read More →

High-powered laser pointers continue to pose a great threat to airlines as they put the lives of hundreds of people at risk for no good reason. Even though the penalties for shining laser pointers at airplanes or helicopters have become more severe, reported incidents continue to grow every year (with 2,836 incidents this year alone).

Read More →

Secure Socket Layer (SSL) is the encryption that is used to protect sensitive online data from hackers and interception by third parties. Normally this form of encryption is used for sensitive data such as e-mail, Facebook and bank login information, but thanks to Google’s new security update, your Google search terms are now protected as well.

Read More →

Facing serious U.S. budget cuts, companies that build high-tech weapons and surveillance tools for the military’s War on Terror will have to look for a new market to sell their high tech drones and surveillance tools. Seeing as the U.S. government wouldn’t want its enemies or other governments to get their hands onto these advanced tools, the companies’ only option would be to try to sell these tools to agencies within the U.S.

Read More →

When you hear about crime prediction software, you might picture something akin to Minority Report, where people are arrested before they even commit a crime. In reality, crime prediction software is a useful tool that calculates where a crime is most likely to occur and sends officers to patrol those areas more frequently.

Read More →

Hollywood movies often depict high-tech biometric systems that can scan your face, eyes, or fingerprints from a surveillance camera and instantly pull up all of your information. Most people take this type of technology to be science fiction, doubting that the technology that we have today is cable of such feats. However, the truth is that it is not only capable, but this technology already exists.

Read More →