Telecoms and Silicon Valley Engage at Mobile World Congress

European telecoms and Silicon Valley giants are jousting again, at the annual Mobile World Congress in Barcelona. The major carriers, including Deutsche Telekom AG and Spain’s Telefónica SA are pushing for the European Union to either lift some of the regulations imposed on them or apply similar rules to Internet-based text and voice services, such as Facebook’s WhatsApp or Google Hangouts. At the same time, several telecoms have signed on to Facebook’s TIP project, an open source initiative to design cellular towers. Continue reading Telecoms and Silicon Valley Engage at Mobile World Congress

Apple and U.S. Government Battle Over Privacy vs. Terrorism

The battle between terrorism and privacy has been brewing for quite some time, and the tipping point was the iPhone belonging to Syed Rizwan Farook, who, with his wife, opened fire at an office party in December 2015, killing 14 people and injuring 22. The FBI has been trying to decrypt Farook’s phone, unsuccessfully, and asked Apple to create a “backdoor” code into the phone. Apple refused, and now a court order gives the Silicon Valley company five days to comply. Chief executive Tim Cook is holding firm. Continue reading Apple and U.S. Government Battle Over Privacy vs. Terrorism

Juniper Networks Backdoor Hack Likely From Foreign Nation

Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation

U.K. Plans to Ban Advanced Encryption to Combat Terrorists

In response to Edward Snowden’s revelations of government surveillance of ordinary citizens, many Internet and social media companies responded by creating encryption so advanced that even they couldn’t read users’ communications. Now, many critics say, terrorists and other criminals are using those same platforms because their messages will be safely encrypted from prying eyes of intelligence and government authorities. Among the strongest critic is the U.K. government, which is proposing that such encryption be illegal. Continue reading U.K. Plans to Ban Advanced Encryption to Combat Terrorists

CalECPA: California Governor Signs Landmark Privacy Law

California Governor Jerry Brown last week signed a new law designed to protect digital privacy rights. The California Electronic Communications Privacy Act (CalECPA) mandates that a warrant is required in order for state law enforcement agencies or investigators to compel businesses to turn over metadata or digital communications such as emails, texts, and cloud-stored documents. Additionally, it requires a warrant for the tracking or searching of electronic devices. The White House, meanwhile, has backed down on its battle with tech companies over encrypted data of digital devices. Continue reading CalECPA: California Governor Signs Landmark Privacy Law

Mobile Companies Face Stagefright, Android Security Issues

The emergence of Stagefright, a malicious code that targets Android phones, has impacted all mobile companies using the Google operating system. Google has already fixed the problem in its own line of Nexus phones and tablets, and now plans to supply monthly security updates wirelessly. Both Samsung and LG have also announced they will be issuing a monthly security update; other impacted mobile phone manufacturers include Sony, HTC and Android One, all of which have provided or plan to provide Stagefright patches. Continue reading Mobile Companies Face Stagefright, Android Security Issues

Tech Industry Urges President to Not Weaken Encryption Tech

Tech companies including Apple, Facebook, Google and Microsoft joined Internet security experts and civil liberties organizations this week to draft a letter to President Obama warning that a “backdoor” for U.S. law enforcement could also serve as a backdoor for hackers and other governments. The Obama administration has been considering whether companies should only be allowed to use encryption that provides law enforcement with unscrambled access (or a “backdoor”). Critics are concerned about weakening encryption tech that protects Internet communications. Continue reading Tech Industry Urges President to Not Weaken Encryption Tech

White House Creates Cybersecurity Agency to Combat Threats

The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats

Twitter Sues U.S. Government Over Surveillance Disclosures

Social network Twitter filed a lawsuit against the U.S. government on Tuesday, seeking to bring more transparency to government surveillance. Twitter wants the government to ease restrictions on what tech companies can publicly disclose about the government’s national security-related requests for user data. The company alleges that these restrictions violate the company’s First Amendment rights. This is the latest in a series of battles over online national surveillance. Continue reading Twitter Sues U.S. Government Over Surveillance Disclosures

NSA Turns to Web Images for Facial Recognition Programs

According to top-secret 2011 documents released by Edward Snowden, the NSA is collecting online images of people for its facial recognition programs. As estimated in the documents, the agency intercepts about 55,000 images that have facial-recognition quality. Civil liberties advocates are concerned that these technologies could result in an invasion of privacy. However, neither privacy nor surveillance laws protect against the government’s use of facial images. Continue reading NSA Turns to Web Images for Facial Recognition Programs

Startup Develops Secure Method to Access Data on Your Phone

Apple’s Touch ID fingerprint reader, released with the iPhone 5s, includes a sensor the thickness of a human hair, a sapphire crystal button, capacitive tech and complex data analysis. Alabama-based startup IDair believes it can replicate the quality of the Touch ID with a simpler approach that uses existing smartphone cameras to capture images of users’ fingers. IDair’s tech uses an algorithm the company has patented to convert the image into a means of identification. Continue reading Startup Develops Secure Method to Access Data on Your Phone

NSA Creates Website and Games to Educate Young Children

In a mission to make government agencies more understandable to children, and the general public, the National Security Agency has created a website filled with interactive games, cartoon characters and puzzles. The goal is to educate children about spying, and spark an early interest in related career paths. The CryptoKids website for “future codemakers and codebreakers” is aimed to make these occupations seem cool, and even has a section entitled “How Can I Work for NSA?” Continue reading NSA Creates Website and Games to Educate Young Children

NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

Megaupload Shutdown: MPAA Rejects Findings of Piracy Study

Last week, the MPAA rejected findings of a European study that suggests the shutdown of piracy site Megaupload damaged revenues for theatrical films other than blockbusters. Megaupload was shut down by the FBI in January 2012. While researchers at Carnegie Mellon found that the shutdown boosted legitimate digital sales of movies, a new study from Ludwig Maximilians University Munich and Copenhagen Business School argues that anti-piracy measures may have unintended consequences for different kinds of movies. Continue reading Megaupload Shutdown: MPAA Rejects Findings of Piracy Study

Losing Ground to Apple and Google, BlackBerry Is Up For Sale

BlackBerry announced on Monday that its board of directors has formed a special committee and has hired JPMorgan Chase & Co. to explore strategic alternatives that could include joint ventures, strategic partnerships or an outright sale of the Waterloo, Ontario-based company. The news follows declining stock value in the wake of disappointing sales of new devices running BlackBerry 10 and a shrinking customer base for the company that helped pioneer the smartphone market. Continue reading Losing Ground to Apple and Google, BlackBerry Is Up For Sale