Police force more suspects to give up crypto keys: Police have expanded their use of powers to force suspects to decrypt files by 50 per cent in the last year, figures released today reveal.… (Via The Register – Public Sector.)Read More
EGYPT: Cyber war among possible presidential candidates: “Source: Nasry Esmat, Los Angeles Times. Egypt’s political cyber war is intensifying after hackers played havoc with the Facebook page of Gamal Mubarak, the son of President Hosni Mubarak and a possible presidential contender in 2011. The role of cyberspace politics is expected to grow through 2011. Statistics...Read More
Below, are pictures, my abstract, and slides from my talk at Def Con 18. DEF CON 18This paper argues that the current rules of war are adequate for addressing the unique issues that are encountered as a result of conducting and defending against cyber warfare. The author begins by giving a survey of the laws...Read More
Korea trying to put cyber security on G20 agenda: “Source: Kim Tong-hyung, The Korea TimesKorea is attempting to present computer security as a topic of discussion for the Group of 20 meetings in Seoul later this year. However, the talks for establishing an international body for combating cybercrimes seem to be discouraged. The Korea Communications...Read More
EFF Wins New Legal Protections for Video Artists, Cell Phone Jailbreakers, and Unlockers: “Via: EFF: The Electronic Frontier Foundation (EFF) won three critical exemptions to the Digital Millennium Copyright Act (DMCA) anticircumvention provisions today, carving out new legal protections for consumers who modify their cell phones and artists who remix videos — people who, until...Read More
Hacker Spoofs Cell Phone Tower to Intercept Calls: “Via: Wired: A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear. The device tricks the phones into disabling encryption and records call details and content...Read More
Feds Admit Storing Checkpoint Body Scan Images: “Via: Wired: For the last few years, federal agencies have defended body scanning by insisting that all images will be discarded as soon as they’re viewed. The Transportation Security Administration claimed last summer, for instance, that “scanned images cannot be stored or recorded.” Now it turns out that...Read More
S. 3480 The audio that you’ll hear is from the press conference video at the bottom of the page. http://hsgac.senate.gov/public/index.cfm?FuseAction=Press.MajorityNews&ContentRecord_id=227d9e1e-5056-8059-765f-2239d301fb7f Critique http://techdailydose.nationaljournal.com/2010/06/groups-wary-of-scope-of-latest.phpRead More
Cyber Warfare- it is here and now!: “Hackers,Terrorists or Cyber Warriors? The same infrastructure we use for managing our daily life, communications, trade and security is also providing subversive elements with the means and access to compromise our national security. This article provides a summary of a Cyber Warfare seminar conducted this week by the...Read More
Recent Comments