Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $72,136
81%  
Woo hoo!! And now less than $15.9k to go!! Let's git 'er done. Thank you all very much!! God bless.

Keyword: cyberspace

Brevity: Headers | « Text »
  • NBC: Obama Told Putin Election Hacking Could Result in 'Armed Conflict'

    12/21/2016 10:25:01 AM PST · by ColdOne · 107 replies
    newsmax.com ^ | 12/20/16 | Jason Devaney
    President Barack Obama reportedly told Russian President Vladimir Putin in October that directly interfering with the U.S. election could result in an "armed conflict." According to NBC News, Obama opted to use the red phone to contact Moscow directly, a communication system that dates back to the Cold War. It's not an actual telephone, but instead sends a secure email message between the two countries. "International law, including the law for armed conflict, applies to actions in cyberspace," part of the Oct. 31 message read, according to NBC. "We will hold Russia to those standards."
  • Assessing China’s Proposal for International Cooperation on Cyberspace

    03/15/2017 9:43:02 AM PDT · by Sean_Anthony · 2 replies
    Canada Free Press ^ | 03/14/17 | Joseph Klein
    When President Trump and President Xi Jinping meet for the first time next month, exploring avenues for further constructive cyberspace cooperation between China and the United States should be amongst the issues they discuss The arcane issue of cybersecurity has received front page media attention of late. Most recently, WikiLeaks published documents which purport to show, according to WikiLeaks, “the scope and direction of the CIA’s global covert hacking program.” The program is comprised of a “malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products…which are turned into covert microphones.”...
  • Justice Department charging Russian spies and criminal hackers in Yahoo intrusion

    03/15/2017 7:38:37 AM PDT · by Theoria · 23 replies
    The Washington Post ^ | 15 March 2017 | Ellen Nakashima
    The Justice Department is set to announce Wednesday the indictments of two Russian spies and two criminal hackers in connection with the heist of 500 million Yahoo user accounts in 2014, marking the first U.S. criminal cyber charges ever against Russian government officials. The indictments target two members of the Russian intelligence agency FSB, and two hackers hired by the Russians. The charges include hacking, wire fraud, trade secret theft and economic espionage, according to officials, who spoke on the condition of anonymity because the charges have not yet been announced. The indictments are part of the largest hacking case...
  • Is St. Louis under a cyber attack? Threat map points to China

    07/08/2015 2:01:03 PM PDT · by mojito · 42 replies
    Fox News ^ | 7/8/2015 | Joe Millizter
    Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorp’s Twitter profile they offer, “Live threat intelligence & unmatched visibility into the darkest corners of the Internet.” A map on the company’s website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
  • Lost in Cyberspace – As Seen in a Commercial

    04/18/2015 8:03:37 AM PDT · by Salvation · 11 replies
    Archdiocese of Washington ^ | 04-17-15 | Msgr. Charles Pope
    Lost in Cyberspace – As Seen in a Commercial By: Msgr. Charles PopeFor most people, the word virtual has come to mean the Internet or the computer world, as in “occurring or existing primarily online.”  But the word virtual has an original meaning that is actually quite descriptive of a modern problem.Prior to its application to the computer world, the word virtual meant “being something in effect, though not actually or expressly being such.” In other words, if something is virtual it has aspects of the real thing but is not the real thing. In the sentence “The man is a virtual goldmine...
  • Hero CIA officer who led the hunt for Bin Laden and converted to Islam is removed from his post in

    03/26/2015 6:14:09 PM PDT · by null and void · 34 replies
    dailymail.co.uk ^ | 13:48 EST, 26 March 2015 | Wills Robinson
    The CIA official who led the hunt for Osama Bin Laden is being removed from his post, it has been revealed. The head of the agency's Counter­terrorism Center, who also directed drone campaigns which killed thousands, has been in the position for nine years and is described as a 'true hero'.
  • China condemns cyberattacks, but says no proof North Korea hacked Sony

    12/22/2014 5:20:39 AM PST · by SoFloFreeper · 4 replies
    Globe and Mail ^ | 12/22/14 | MEGHA RAJAGOPALAN AND STEVE HOLLAND
    China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said. North Korea has denied it was to blame and has vowed to hit back against any U.S. retaliation, threatening the White House and the Pentagon. The hackers said they were incensed by a Sony comedy about a fictional assassination of North Korean leader Kim Jong-un, which the studio has pulled.
  • Iran Spy Network 30,000 Strong

    01/03/2013 3:07:06 AM PST · by Cindy · 18 replies
    THE WASHINGTON FREE BEACON ^ | January 3, 2013 4:59 am | Bill Gertz
    "IRAN SPY NETWORK 30,000 STRONG Pentagon report: Iranian intelligence linked to spying, terror attacks" SNIPPET: "Iran’s intelligence service includes 30,000 people who are engaged in covert and clandestine activities that range from spying to stealing technology to terrorist bombings and assassination, according to a Pentagon report." SNIPPET: "“MOIS provides financial, material, technological, or other support services to Hamas, Hezbollah, and al Qaeda in Iraq (AQI), all designated terrorist organizations under U.S. Executive Order 13224,” the report said. The spy service operates in all areas where Iran has interests, including Afghanistan, Iraq, Kuwait, Lebanon, Central Asia, Africa, Austria, Azerbaijan, Croatia, France,...
  • Social Media, Terrorism Connect Too Well

    12/05/2012 12:51:07 AM PST · by Cindy · 28 replies
    SFGATE.com ^ | Published 1:16 p.m., Saturday, December 1, 2012 | Janine Zacharia
    SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do about it. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
  • Senate panel approves bill requiring police to get a warrant to read emails

    11/29/2012 11:53:08 AM PST · by jazusamo · 17 replies
    Fox News ^ | November 29, 2012 | Perry Chiaramonte
    A key Senate panel approved legislation Thursday that would require police to obtain a search warrant from a judge before they can read a private citizen's emails, Facebook messages or other electronic communications. The revised Electronic Communications Privacy Act (ECPA) passed by the Senate Judiciary Committee will now move on to the full Senate for a vote. Passage would be a victory for privacy advocates, who say current privacy rules have been left in the dust by technological progress. Committee Chairman Sen. Patrick Leahy (D-Vt.), who played a key role in drafting the original bill, has called the existing law,...
  • Whatever happened to the right to be left alone?

    11/28/2012 10:55:03 AM PST · by jazusamo · 27 replies
    Fox News ^ | November 28, 2012 | Judge Andrew P. Napolitano
    <p>The Fourth Amendment to the U.S. Constitution was written in order to keep the government from invading the right to be left alone--today known as the right to privacy. The Framers who wrote the Constitution, and Jefferson and his colleagues who insisted on the Fourth amendment among others, had suffered grievously at the hands of the British king and his soldiers.</p>
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Chinese Spies Use Fake Facebook Pages to Gain Intel

    03/12/2012 7:58:06 PM PDT · by U-238 · 18 replies · 1+ views
    Defense Tech ^ | 3/12/2012 | Defense Tech
    We’re always hearing about high-end cyber epionage but sometimes, enemy spies can steal military secrets without investing a ton of time or money breaking into Pentagon networks. In fact, Chinese spies just used a fake Fasebook account to get personal information from a ton of NATO officials. Yup, Chinese spies set up a face Facebook page for Adm. James Stavridis, chief of U.S. European Command and fooled a bunch of high-ranking military officials into friending the fake admiral and sharing info with them. This is a pretty common move, just a couple of weeks ago I had a conversation with...
  • AP sources: White House set to unveil cyber plan

    05/12/2011 3:41:38 AM PDT · by markomalley · 22 replies
    AP/Yahoo ^ | 5/12/11 | Lolita Baldor
    The White House on Thursday is expected to unveil its proposal to enhance the nation's cybersecurity, laying out plans to require industry to better protect systems that run critical infrastructure like the electrical grid, financial systems and nuclear power plants. The Obama administration also is insisting that companies tell consumers when their personal information has been compromised. According to cybersecurity experts familiar with the plan, the administration's proposed legislation also would instruct federal agencies to more closely monitor their computer networks. Several House and Senate committees have been working on cybersecurity legislation for the past two years, while waiting for...
  • The deindustrialization of America

    01/02/2011 7:47:31 AM PST · by jmaroneps37 · 63 replies
    Coach is Right ^ | JANUARY 2, 2011 | Suzanne Eovaldi, staff writer
    An anonymous email making the cyberspace rounds is so upsetting that its author was correct to hide his name. The “Changes Are Coming” email details the demise of our post office, our newspapers, check writing systems, books and music as we know them along with the end of Cable TV and network systems as now constituted. But the harshest caveat bearing down on America is our demise due to deindustrialization. The email reports that “Tens of thousands of factories have left the U.S. in the past decade alone. Millions upon millions of manufacturing jobs have been lost. . .the U.S....
  • Software smart bomb fired at Iranian nuclear plant

    09/25/2010 9:11:15 AM PDT · by Pride_of_the_Bluegrass · 51 replies
    SAN FRANCISCO: Computer security experts are studying a scary new cyber weapon: a software smart bomb that may have been crafted to find and sabotage a nuclear facility in Iran. Malicious software, or malware, dubbed "Stuxnet" is able to recognise a specific facility's control network and then destroy it, according to German computer security researcher Ralph Langner. "Welcome to cyber war," Langner said in a post at his website. "This is sabotage." Langner has been analyzing Stuxnet since it was discovered in June and said the code had a technology fingerprint of the control system it was seeking and would...
  • 'Pentagon's computer network was breached by foreign power' (most serious breach ever)

    08/25/2010 8:55:41 PM PDT · by VRWCTexan · 51 replies · 1+ views
    Jerusalem Post ^ | 08/26/2010
    A foreign spy agency pulled off the most serious breach of Pentagon computer networks ever by inserting a flash drive into a U.S. military laptop, a top defense official said Wednesday.
  • The National Strategy for Trusted Identities in Cyberspace

    06/25/2010 10:55:29 PM PDT · by cryptical · 13 replies
    White House Blog ^ | June 25, 2010 | Howard A. Schmidt
    Cyberspace has become an indispensible component of everyday life for all Americans.  We have all witnessed how the application and use of this technology has increased exponentially over the years. Cyberspace includes the networks in our homes, businesses, schools, and our Nation’s critical infrastructure.  It is where we exchange information, buy and sell products and services, and enable many other types of transactions across a wide range of sectors. But not all components of this technology have kept up with the pace of growth.  Privacy and security require greater emphasis moving forward; and because of this, the technology that has brought many...
  • Groundbreaking cyber espionage report to be released

    04/06/2010 4:12:47 AM PDT · by decimon · 5 replies · 288+ views
    University of Toronto ^ | Apr 6, 2010 | Unknown
    TORONTO, ON – The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. Members of the research team are holding a news conference at 11 a.m. on Tuesday, April 6, to discuss their latest findings and to answer questions from the media....
  • Cybersecurity: Progress Made but Challenges Remain...

    03/06/2010 1:30:35 PM PST · by Cindy · 2 replies · 154+ views
    Note: This is a SNIPPET only. Quote: GAO U.S. GOVERNMENT ACCOUNTABILITY OFFICE http://gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative" GAO-10-338 March 5, 2010 SNIPPET: "Summary In response to the ongoing threats to federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative (CNCI) in 2008. This initiative consists of a set of projects aimed at reducing vulnerabilities, protecting against intrusions, and anticipating future threats. GAO was asked to determine (1) what actions have been taken to develop interagency mechanisms to plan and coordinate CNCI activities and...