Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $14,911
18%  
Woo hoo!! And we're now over 18%!! Thank you all very much!! God bless.

Keyword: cyberspace

Brevity: Headers | « Text »
  • Microsoft warns of serious vulnerabilities in Netgear's DGN220)v1 router

    07/01/2021 12:02:17 PM PDT · by grey_whiskers · 14 replies
    The Register ^ | Jul 1, 2021 | Gareth Halfacree
    Netgear has patched serious security vulnerabilities in its DGN2200v1 network router, following the discovery of "very odd behaviour" by a Microsoft security research team - a somewhat understated way of saying that attackers can gain "complete control over the router."
  • Bill Gates known for ‘womanizing,’ naked pool parties, biographer says

    05/10/2021 12:25:53 PM PDT · by george76 · 138 replies
    NY Post ^ | May 10, 2021 | Lee Brown
    Behind his image as a straight-laced tech mogul, Bill Gates was notorious for throwing naked pool parties with strippers and being a “womanizer” — even after meeting future wife Melinda, according to a biography. The Microsoft co-founder’s wild lifestyle was well known among his inner circle — but newspapers like the New York Times hid the unflattering reports to continue getting “spoon-fed stories,” James Wallace wrote in the 1997 biography, “Overdrive: Bill Gates and the Race to Control Cyberspace.” They “didn’t report on the wild bachelor parties that Microsoft’s boyish chairman would throw in his Seattle home, for which Gates...
  • The Set Designs In Virtual Reality Concerts Are Cosmic — But At What Cost?

    04/05/2021 7:23:41 AM PDT · by Kaslin · 14 replies
    The Federalist ^ | April 5, 2021 | Joe Allen
    Set designers were finally able to draw fans into their vivid dream without the constraints of Newtonian physics. Yet virtual reality isn't all wonder.Pandemic lockdowns crushed the concert industry, but things are finally starting to move again. Many of us are optimistic that dense crowds might gather regularly by mid-autumn. The process is already starting in red states. Once everybody who’s anybody “takes the jab,” mass events should spread slowly across the country.All over the world, people are dying for another taste of what Émile Durkheim called “collective effervescence”: the intense thrill we get from a mass gathering with a...
  • Assistant Attorney General Brian A. Benczkowski Delivers Remarks at the “Justice in Cyberspace” Symposium

    02/05/2020 5:45:50 PM PST · by ransomnote · 2 replies
    justice.gov ^ | February 5, 2020 | Assistant Attorney General Brian A. Benczkowski
    Assistant Attorney General Brian A. Benczkowski Delivers Remarks at the “Justice in Cyberspace” Symposium Washington, DC  ~  Wednesday, February 5, 2020 Remarks as Prepared for Delivery  Good afternoon.  Thank you, Richard, for that kind introduction.It is a privilege to address this year’s symposium, and I want to thank American University’s Washington College of Law for their collaboration on this important event.This year’s theme is “Justice in Cyberspace,” and I want to spend some time talking about what that means for the Department of Justice and the Criminal Division.Let’s start with “Justice.”  The Robert F. Kennedy Building, where I work, is a...
  • Public Forums Should Be Open and Uncensored

    05/26/2018 5:41:55 AM PDT · by Kaslin · 75 replies
    Townhall.com ^ | May 26, 2018 | Paul Driessen
    President Trump may not block even rude or obnoxious criticism from his Twitter account, because it is a public forum that is protected by the First Amendment, US District Court Judge Naomi Reice Buchwald has ruled. The President’s use of his Twitter account to comment on important policy, personnel and personal announcements made it a public forum, akin to a park or town square, she concluded.Blocking unwanted tweets is thus viewpoint discrimination, which public officials are not permitted to engage in. Indeed, his Twitter account is not just a public forum. It is also “government space,” and thus may not...
  • A Declaration of the Independence of Cyberspace

    03/16/2018 6:59:55 AM PDT · by Enlightened1 · 7 replies
    Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You...
  • NBC: Obama Told Putin Election Hacking Could Result in 'Armed Conflict'

    12/21/2016 10:25:01 AM PST · by ColdOne · 112 replies
    newsmax.com ^ | 12/20/16 | Jason Devaney
    President Barack Obama reportedly told Russian President Vladimir Putin in October that directly interfering with the U.S. election could result in an "armed conflict." According to NBC News, Obama opted to use the red phone to contact Moscow directly, a communication system that dates back to the Cold War. It's not an actual telephone, but instead sends a secure email message between the two countries. "International law, including the law for armed conflict, applies to actions in cyberspace," part of the Oct. 31 message read, according to NBC. "We will hold Russia to those standards."
  • Assessing China’s Proposal for International Cooperation on Cyberspace

    03/15/2017 9:43:02 AM PDT · by Sean_Anthony · 2 replies
    Canada Free Press ^ | 03/14/17 | Joseph Klein
    When President Trump and President Xi Jinping meet for the first time next month, exploring avenues for further constructive cyberspace cooperation between China and the United States should be amongst the issues they discuss The arcane issue of cybersecurity has received front page media attention of late. Most recently, WikiLeaks published documents which purport to show, according to WikiLeaks, “the scope and direction of the CIA’s global covert hacking program.” The program is comprised of a “malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products…which are turned into covert microphones.”...
  • Justice Department charging Russian spies and criminal hackers in Yahoo intrusion

    03/15/2017 7:38:37 AM PDT · by Theoria · 23 replies
    The Washington Post ^ | 15 March 2017 | Ellen Nakashima
    The Justice Department is set to announce Wednesday the indictments of two Russian spies and two criminal hackers in connection with the heist of 500 million Yahoo user accounts in 2014, marking the first U.S. criminal cyber charges ever against Russian government officials. The indictments target two members of the Russian intelligence agency FSB, and two hackers hired by the Russians. The charges include hacking, wire fraud, trade secret theft and economic espionage, according to officials, who spoke on the condition of anonymity because the charges have not yet been announced. The indictments are part of the largest hacking case...
  • Is St. Louis under a cyber attack? Threat map points to China

    07/08/2015 2:01:03 PM PDT · by mojito · 42 replies
    Fox News ^ | 7/8/2015 | Joe Millizter
    Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorp’s Twitter profile they offer, “Live threat intelligence & unmatched visibility into the darkest corners of the Internet.” A map on the company’s website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
  • Lost in Cyberspace – As Seen in a Commercial

    04/18/2015 8:03:37 AM PDT · by Salvation · 11 replies
    Archdiocese of Washington ^ | 04-17-15 | Msgr. Charles Pope
    Lost in Cyberspace – As Seen in a Commercial By: Msgr. Charles PopeFor most people, the word virtual has come to mean the Internet or the computer world, as in “occurring or existing primarily online.”  But the word virtual has an original meaning that is actually quite descriptive of a modern problem.Prior to its application to the computer world, the word virtual meant “being something in effect, though not actually or expressly being such.” In other words, if something is virtual it has aspects of the real thing but is not the real thing. In the sentence “The man is a virtual goldmine...
  • Hero CIA officer who led the hunt for Bin Laden and converted to Islam is removed from his post in

    03/26/2015 6:14:09 PM PDT · by null and void · 34 replies
    dailymail.co.uk ^ | 13:48 EST, 26 March 2015 | Wills Robinson
    The CIA official who led the hunt for Osama Bin Laden is being removed from his post, it has been revealed. The head of the agency's Counter­terrorism Center, who also directed drone campaigns which killed thousands, has been in the position for nine years and is described as a 'true hero'.
  • China condemns cyberattacks, but says no proof North Korea hacked Sony

    12/22/2014 5:20:39 AM PST · by SoFloFreeper · 4 replies
    Globe and Mail ^ | 12/22/14 | MEGHA RAJAGOPALAN AND STEVE HOLLAND
    China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said. North Korea has denied it was to blame and has vowed to hit back against any U.S. retaliation, threatening the White House and the Pentagon. The hackers said they were incensed by a Sony comedy about a fictional assassination of North Korean leader Kim Jong-un, which the studio has pulled.
  • Iran Spy Network 30,000 Strong

    01/03/2013 3:07:06 AM PST · by Cindy · 18 replies
    THE WASHINGTON FREE BEACON ^ | January 3, 2013 4:59 am | Bill Gertz
    "IRAN SPY NETWORK 30,000 STRONG Pentagon report: Iranian intelligence linked to spying, terror attacks" SNIPPET: "Iran’s intelligence service includes 30,000 people who are engaged in covert and clandestine activities that range from spying to stealing technology to terrorist bombings and assassination, according to a Pentagon report." SNIPPET: "“MOIS provides financial, material, technological, or other support services to Hamas, Hezbollah, and al Qaeda in Iraq (AQI), all designated terrorist organizations under U.S. Executive Order 13224,” the report said. The spy service operates in all areas where Iran has interests, including Afghanistan, Iraq, Kuwait, Lebanon, Central Asia, Africa, Austria, Azerbaijan, Croatia, France,...
  • Social Media, Terrorism Connect Too Well

    12/05/2012 12:51:07 AM PST · by Cindy · 28 replies
    SFGATE.com ^ | Published 1:16 p.m., Saturday, December 1, 2012 | Janine Zacharia
    SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do about it. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
  • Senate panel approves bill requiring police to get a warrant to read emails

    11/29/2012 11:53:08 AM PST · by jazusamo · 17 replies
    Fox News ^ | November 29, 2012 | Perry Chiaramonte
    A key Senate panel approved legislation Thursday that would require police to obtain a search warrant from a judge before they can read a private citizen's emails, Facebook messages or other electronic communications. The revised Electronic Communications Privacy Act (ECPA) passed by the Senate Judiciary Committee will now move on to the full Senate for a vote. Passage would be a victory for privacy advocates, who say current privacy rules have been left in the dust by technological progress. Committee Chairman Sen. Patrick Leahy (D-Vt.), who played a key role in drafting the original bill, has called the existing law,...
  • Whatever happened to the right to be left alone?

    11/28/2012 10:55:03 AM PST · by jazusamo · 27 replies
    Fox News ^ | November 28, 2012 | Judge Andrew P. Napolitano
    <p>The Fourth Amendment to the U.S. Constitution was written in order to keep the government from invading the right to be left alone--today known as the right to privacy. The Framers who wrote the Constitution, and Jefferson and his colleagues who insisted on the Fourth amendment among others, had suffered grievously at the hands of the British king and his soldiers.</p>
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Chinese Spies Use Fake Facebook Pages to Gain Intel

    03/12/2012 7:58:06 PM PDT · by U-238 · 18 replies · 1+ views
    Defense Tech ^ | 3/12/2012 | Defense Tech
    We’re always hearing about high-end cyber epionage but sometimes, enemy spies can steal military secrets without investing a ton of time or money breaking into Pentagon networks. In fact, Chinese spies just used a fake Fasebook account to get personal information from a ton of NATO officials. Yup, Chinese spies set up a face Facebook page for Adm. James Stavridis, chief of U.S. European Command and fooled a bunch of high-ranking military officials into friending the fake admiral and sharing info with them. This is a pretty common move, just a couple of weeks ago I had a conversation with...
  • AP sources: White House set to unveil cyber plan

    05/12/2011 3:41:38 AM PDT · by markomalley · 22 replies
    AP/Yahoo ^ | 5/12/11 | Lolita Baldor
    The White House on Thursday is expected to unveil its proposal to enhance the nation's cybersecurity, laying out plans to require industry to better protect systems that run critical infrastructure like the electrical grid, financial systems and nuclear power plants. The Obama administration also is insisting that companies tell consumers when their personal information has been compromised. According to cybersecurity experts familiar with the plan, the administration's proposed legislation also would instruct federal agencies to more closely monitor their computer networks. Several House and Senate committees have been working on cybersecurity legislation for the past two years, while waiting for...