Police force more suspects to give up crypto keys: Police have expanded their use of powers to force suspects to decrypt files by 50 per cent in the last year, figures released today reveal.… (Via The Register – Public Sector.)
Read MoreEGYPT: Cyber war among possible presidential candidates: “Source: Nasry Esmat, Los Angeles Times. Egypt’s political cyber war is intensifying after hackers played havoc with the Facebook page of Gamal Mubarak, the son of President Hosni Mubarak and a possible presidential contender in 2011. The role...
Read MoreBelow, are pictures, my abstract, and slides from my talk at Def Con 18. DEF CON 18This paper argues that the current rules of war are adequate for addressing the unique issues that are encountered as a result of conducting and defending against cyber warfare....
Read MoreKorea trying to put cyber security on G20 agenda: “Source: Kim Tong-hyung, The Korea TimesKorea is attempting to present computer security as a topic of discussion for the Group of 20 meetings in Seoul later this year. However, the talks for establishing an international body...
Read MoreEFF Wins New Legal Protections for Video Artists, Cell Phone Jailbreakers, and Unlockers: “Via: EFF: The Electronic Frontier Foundation (EFF) won three critical exemptions to the Digital Millennium Copyright Act (DMCA) anticircumvention provisions today, carving out new legal protections for consumers who modify their cell...
Read MoreHacker Spoofs Cell Phone Tower to Intercept Calls: “Via: Wired: A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear. The device tricks the...
Read MoreFeds Admit Storing Checkpoint Body Scan Images: “Via: Wired: For the last few years, federal agencies have defended body scanning by insisting that all images will be discarded as soon as they’re viewed. The Transportation Security Administration claimed last summer, for instance, that “scanned images...
Read MoreS. 3480 The audio that you’ll hear is from the press conference video at the bottom of the page. http://hsgac.senate.gov/public/index.cfm?FuseAction=Press.MajorityNews&ContentRecord_id=227d9e1e-5056-8059-765f-2239d301fb7f Critique http://techdailydose.nationaljournal.com/2010/06/groups-wary-of-scope-of-latest.php
Read MoreCyber Warfare- it is here and now!: “Hackers,Terrorists or Cyber Warriors? The same infrastructure we use for managing our daily life, communications, trade and security is also providing subversive elements with the means and access to compromise our national security. This article provides a summary...
Read More