HAVANA (AP) — Cut off from the Internet, young Cubans have quietly linked thousands of computers into a hidden network that stretches miles across Havana, letting them chat with friends, play games and download hit movies in a mini-replica of the online world that most can't access.
So, as you probably heard last week, JP Morgan revealed more details of how it had been hacked, noting that the number of households impacted shot up to 76 million, thus impacting a pretty large percentage of Americans. The hack involved getting access to customer names, addresses, phone numbers and emails. It doesn't appear to have gotten anything else, but that's plenty of information to run some sophisticated phishing attacks that could lead to some serious problems. It's expected that the fallout from this could be quite long lasting.
Former National Security Agency contractor Edward Snowden won't use an Apple iPhone because he says it has "special software" that can be activated remotely, allowing the government to spy on its user.
"Edward never uses an iPhone; he's got a simple phone," Anatoly Kucherena, Snowden's attorney, said in an interview with RIA Novosti, a Russian media company, reports Tech Times.
Prime Minister David Cameron has quite literally called for the end of privacy on the Internet as we know it: in a radical speech on Monday he said that, since threats of terrorism existed in the world, there should be no “means of communications” that the UK “cannot read.” He appears to be suggesting that he’s in favour of outlawing the use of end-to-end encryption – which, in turn, could ban some of the most popular texting messaging apps in the world, including WhatsApp and iMessage.
As the media prepared to vacate newsrooms for the weekend, Democrats snuck in a last minute proposal that the Federal Elections Commission (FEC) be allowed to heavily regulate political content on internet sites such as Youtube, blogs, and the Drudge Report.
Now that the long-delayed CIA Torture Report has been released, it's time to find someone to blame. Not for the torture, of course. There will apparently be no punishments handed down for the abuse uncovered by the Senate Intelligence Committee. (Also, apparently, there will be no huge international fallout. Remember just a few short weeks ago when we were promised increased terrorist activity if the report was released? Still waiting…) But there will be some noise made about the Senate's alleged impropriety.
Yesterday, President Obama announced plans to “modernize” laws supposed to protect innocents from cyber attacks like the one that tore Sony Pictures apart towards the end of last year. But according to security experts, the proposed legislation could be used against anyone with the slightest link to digital crime.
The White House unveiled Tuesday an updated cybersecurity information-sharing proposal, which critics quickly likened to a controversial bill that failed in Congress two years ago.
With little fanfare, the Obama administration said Tuesday its proposal "encourages the private sector to share appropriate cyber threat information" with the Dept. of Homeland Security, which will then share it with other U.S. government agencies and private sector companies.
The United States is in real trouble when the story about the hacking into Sony Pictures computers and their decision to pull an inane comedy totally big foots the deeply troubling Senate Intelligence Committee’s study of the CIA’s Detention and Interrogation Program.
The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.
The National Security Agency violated US law for over a decade with the unauthorized surveillance of domestic citizens’ overseas communications, according to highly redacted reports obtained by the ACLU in a Freedom of Information Act lawsuit.
According to documents posted on the NSA website Wednesday, the examples of violations include sending data on Americans to unauthorized recipients, storing such data on unprotected computers and retaining them after they were meant to be destroyed between the years 2001 and 2013.
A portion of a 1789 law signed by George Washington requires Apple Inc. to help decrypt information on smartphones and tablets marketed as protected against government intrusion, the feds say.
And federal magistrates in at least two states have agreed with government lawyers that, under the All Writs Act, companies including Apple have to provide “reasonable technical assistance” to help decrypt messages sent from their electronic devices, according to Ars Technica’s Law & Disorder blog of and the Wall Street Journal’s Digits blog.
SAN DIEGO, June 7, 2014 —In 2010, some cruel remarks on Facebook led to the arrest of Marquan Mackey-Meggs who attended Cohoes High School in New York state’s Albany County. His arrest resulted from a new cyber-bullying law. Now, in the year 2014, civil libertarians are concerned that application of this law could eventually lead to other kinds of arrests that go far beyond bullying.
Free speech, as guaranteed in the First Amendment, weighs in the balance.
Edward Lucas has a habit of popping up at pivotal moments in European history.
In March 1990, shortly after Lithuania declared independence from the Soviet Union, the Economist editor caught a flight to Vilnius and received the first Lithuanian visa: number 0001, a stamp-sized chink in the Iron Curtain that got him arrested and deported by Soviet authorities.