Government Surveillance Bill Is Sidelined by Privacy Question

The House of Representatives, after closed-door negotiations, came to an agreement to bring an amendment to vote that would protect Americans from FBI and CIA surveillance of their web browsing history without a warrant. The amendment, introduced by Zoe Lofgren (D-California) and Warren Davidson (R-Ohio), would be a “significant reform to Section 215 [of the USA Patriot Act] that protects Americans’ civil liberties,” said Lofgren. However, after full details of the proposal were released, debate over who would specifically be protected led to the amendment’s downfall. Continue reading Government Surveillance Bill Is Sidelined by Privacy Question

Defense Dept. Taps Microsoft For Cloud Computing Project

Microsoft won a $10 billion, 10-year technology contract with the Department of Defense for its Joint Enterprise Defense Infrastructure (JEDI) project. Although Amazon was the front-runner, President Trump had upped his criticism of Amazon founder Jeff Bezos and stated he might intervene to prevent Bezos’ company from getting the JEDI contract. Google, IBM and Oracle also competed for the contract. A group of Microsoft employees has protested the company’s involvement in the military project. Continue reading Defense Dept. Taps Microsoft For Cloud Computing Project

Federal Government Takes Additional Steps to Block Huawei

The U.S. government is reportedly pushing for foreign allies to stop using hardware from China-based Huawei Technologies Co. According to people familiar with the initiative, the government is aiming to convince wireless and Internet service providers to avoid telecom equipment that comes from Huawei in an effort to increase security. Washington officials are particularly concerned about countries that host military bases. The U.S. and Australia already have bans in place to curb the risk of cyberattacks. Huawei is the world’s largest telecommunications provider. Continue reading Federal Government Takes Additional Steps to Block Huawei

China Reportedly Used Tiny Chips to Hack U.S. Companies

According to a Bloomberg Businessweek cover story today, Chinese spies infiltrated nearly 30 U.S. companies including Amazon and Apple by embedding tiny chips into servers in the technology supply chain. In 2015, malicious microchips were reportedly embedded in servers bound for U.S. companies, which resulted in compromised software used in numerous hardware devices. While the report cites former government officials and “senior insiders” at Apple, both Amazon and Apple — as well as motherboard manufacturer Supermicro and China’s Ministry of Foreign Affairs — have firmly disputed the findings. Continue reading China Reportedly Used Tiny Chips to Hack U.S. Companies

Advice on Keeping Smaller Businesses Safe From Cybercrime

The threat of ransomware and malware are growing. The “WannaCry” attack impacted at least 200,000 computers in 150 countries before peaking last week. Adylkuzz is another piece of malware currently threatening computers around the world. As computers become increasingly connected, so opportunities for cybercrime expand, say the experts. Part of the problem is that the Internet wasn’t designed with cybersecurity protections, and criminals are attracted to cybercrimes for the relatively easy profits they can make. Continue reading Advice on Keeping Smaller Businesses Safe From Cybercrime

WikiLeaks Claims of CIA Hacking Could Impact Tech Industry

WikiLeaks released thousands of documents yesterday that it claims detail methods used by the CIA “to break into smartphones, computers and even Internet-connected televisions,” reports The New York Times. According to WikiLeaks, the CIA and allied intelligence services bypassed encryption on messaging services including Signal, Telegram and WhatsApp. WikiLeaks also suggests that agencies can collect audio and messaging data from Android phones “before encryption is applied.” The Wall Street Journal notes that such activities, if actually taking place with consumer electronics, could fuel tensions between intelligence agencies and the tech industry, which has been concerned about customer privacy. Mobile devices are a major concern; NYT published an article detailing potential smartphone vulnerabilities. Continue reading WikiLeaks Claims of CIA Hacking Could Impact Tech Industry

Signal Emerges as a Must-Have Hacker-Proof Messaging App

The free encrypted messaging app Signal is gaining users, not just because privacy advocates and security researchers have all given it a seal of approval. The app, available for smartphone and computer, is a bulwark against hacking, which got a national spotlight when WikiLeaks posted emails from Hillary Clinton campaign chair John Podesta. Others fear increased government surveillance under the incoming President Donald Trump, a reaction to Trump’s choice of CIA chief, Mike Pompeo, who advocates just that. Continue reading Signal Emerges as a Must-Have Hacker-Proof Messaging App

Leaked Documents Offer Details of U.S. Military’s Drone Wars

Two years after government contractor Edward Snowden famously leaked secret NSA documents, another release of classified information has occurred. This time, The Intercept — which is staffed by journalists who previously worked with Snowden — has published what it claims is a comprehensive breakdown of the U.S. government’s military drone program. The report, featuring documents provided by another whistleblower, offers details regarding U.S. strategy to kill foreign targets in Afghanistan, Somalia and Yemen — and highlights the unintended consequences involved with drone wars. Continue reading Leaked Documents Offer Details of U.S. Military’s Drone Wars

White House Creates Cybersecurity Agency to Combat Threats

The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats

NSA Creates Website and Games to Educate Young Children

In a mission to make government agencies more understandable to children, and the general public, the National Security Agency has created a website filled with interactive games, cartoon characters and puzzles. The goal is to educate children about spying, and spark an early interest in related career paths. The CryptoKids website for “future codemakers and codebreakers” is aimed to make these occupations seem cool, and even has a section entitled “How Can I Work for NSA?” Continue reading NSA Creates Website and Games to Educate Young Children

NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

Jeff Bezos Reveals Amazon’s Plans for Drone Delivery Service

Amazon CEO Jeff Bezos revealed some significant plans for the company on “60 Minutes” this week. In the not-too-distant future, Amazon plans to offer drone delivery service for its smaller packages headed for customers close to its distribution centers. Bezos expects packages weighing less than five pounds to be deliverable to addresses within a 10-mile radius by small helicopter-like devices. Amazon is calling the service “Prime Air.” Continue reading Jeff Bezos Reveals Amazon’s Plans for Drone Delivery Service

Amazon Web Services: Outage During Bid for CIA Contract

Amazon’s Web Services went down on Sunday due to a technical issue at a North Virginia data center. The outage was caused by a problem with a single networking device, and reveals that many companies do not distribute their Web services in different locations for service redundancy. This comes as Amazon is bidding on a CIA contract to manage their data services, and competitors are critical of whether Amazon can manage the demands of government data. Continue reading Amazon Web Services: Outage During Bid for CIA Contract

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Vengeful Librarians: Is the CIA Monitoring Your Tweets Every Day?

  • In an effort to strengthen its counterterrorism and counterproliferation measures, the U.S. Central Intelligence Agency actively monitors over 5 million of the 140 million tweets posted daily.
  • The CIA monitors Twitter and Facebook daily, regularly briefing President Obama on popular posts and trends.
  • The McLean, Virginia-based monitoring team — called the “Vengeful Librarians” — tracks news and social media sources, using language to pinpoint origin.
  • “The CIA team has also used Twitter to monitor reports of real-time events, and can focus on a few Tweeters who are publishing accurate reports,” reports Digital Trends. “The team found that, in these situations, other Twitter users actively stamp out erroneous information when it is reported, which proves the usefulness of Twitter as a primary source for breaking news.”

Page 1 of 212