Snowden Docs: British Spies Used DDoS Attacks Against Anonymous - 0 views
-
"The new documents reveal that a GCHQ unit dubbed the Joint Threat Research Intelligence Group, or JTRIG, launched an operation called Rolling Thunder against the hacker collective in 2011. That operation included using DDoS attacks as well as malware to slow down the hackers and later identify them, as first reported by as reported by NBC News on Wednesday."
Attempting to Code the Human Brain - WSJ.com - 0 views
-
"Such powerful software is still several years away from being fully developed, if at all, and raises all sorts of ethical questions. But the potential applications-such as masterfully translating foreign languages, identifying objects in photos and directing self-driving cars through busy intersections-are so compelling that technology giants like Facebook and Google Inc. are investing heavily in artificial intelligence"
David Cameron's favourite censorware is built and maintained by Huawei - Boing Boing - 0 views
-
"Now the BBC reports that Homesafe was built by Huawei, the Chinese IT giant Huawei, founded by Ren Zhengfei, a former officer in China's People's Liberation Army. Huawei has been characterized by senior Western spooks as an arm of the Chinese intelligence service, conducting industrial espionage on its behalf. "
Edward Snowden's secure email provider Lavabit forced to close by US security services ... - 0 views
-
"The secure email service used by US whistleblower Edward Snowden has shut down rather than comply with orders from US security services - and is also legally barred from speaking out. The owner and operator of Lavabit, Ladar Levison, took the service down yesterday "for maintenance" before revealing today that the real reason was demands from US intelligence."
Snowden asks Putin about surveillance in Russia on televised call-in show (video) - Boi... - 0 views
-
""I'd like to ask you," NSA whistleblower Edward Snowden asked Russian leader Vladimir Putin on a televised call-in show, "does Russia intercept, store or analyze in any way the communications of millions of individuals?" Putin, a former KGB agent and head of Russia's intelligence service, spoke about what they had in common: spycraft. "
Bruce Schneier: Sure, Russia & China Probably Have The Snowden Docs... But Not Because ... - 0 views
-
"First, the journalists working with the documents. I've handled some of the Snowden documents myself, and even though I'm a paranoid cryptographer, I know how difficult it is to maintain perfect security. It's been open season on the computers of the journalists Snowden shared documents with since this story broke in July 2013. And while they have been taking extraordinary pains to secure those computers, it's almost certainly not enough to keep out the world's intelligence services."
Autonomous weapons: UN delay could open door to robot wars, say experts | Science | The... - 0 views
-
""China wanted to discuss 'existing and emerging technologies' but the wording insisted on by the US and the UK is that it is only about emerging technologies," said Noel Sharkey, a professor of artificial intelligence and robotics at the University of Sheffield and co-founder of the International Committee for Robot Arms Control, a coalition of robotics experts who are campaigning against the military use of robots."
NSA facial recognition: combining national ID cards, Internet intercepts, and commercia... - 0 views
-
"A newly released set of slides from the Snowden leaks reveals that the NSA is harvesting millions of facial images from the Web for use in facial recognition algorithms through a program called "Identity Intelligence." James Risen and Laura Poitras's NYT piece shows that the NSA is linking these facial images with other biometrics, identity data, and "behavioral" data including "travel, financial, behaviors, social network." "
Leaked employee passwords open up Fortune 500 companies to hackers - 0 views
-
"At 221 of the Fortune 500 companies, Fortune magazine's list of the the top 500 U.S. public corporations ranked by gross revenue, employees' credentials are posted publicly online for hackers to steal and reuse in cyberattacks, according to new research from the web intelligence firm Recorded Future. "
Algorithm Might Protect Non-Targets Caught In Surveillance, But Only If The Government ... - 0 views
-
"It's highly unlikely investigative or intelligence agencies have much of an interest in protecting the privacy of non-targeted citizens, even in non-terrorist-related surveillance -- not if it means using alternate (read: "less effective") investigative methods or techniques. It has been demonstrated time and time again that law enforcement is more interested in the most direct route to what it seeks, no matter how much collateral damage is generated. "
« First
‹ Previous
81 - 100 of 325
Next ›
Last »
Showing 20▼ items per page