The former NSA official held his thumb and forefinger close together: “We are that far from a turnkey totalitarian state.”Read more »
The biggest worry is likely to be this: That this program sets out to accomplish the same aims as the National ID scheme. Difference is, rather than trying to get the states to do the heavy lifting, Washington is going to try and compel private companies to do it.
So a campaign has already started to convince Americans to trust the government on this. (insert canned laughter here)
Fifteen thousand military computer networks became protected on November 3, 2010. Those ensconced within the informational phalanx called the event Cyber Command Day. They lived only to face a new challenge — the war against the Machines.Read more »
US government offers first full disclosure of spying costs ever.Read more »
"What’s cryptology? Cryptology is making and breaking codes. It’s so cool. We make codes so we can send secret messages to our friends. And we try to figure out what other people are writing about by breaking their codes. It’s a lot of fun."Read more »
US intelligence agencies complain the country’s “Creation and Internet Law” – Hadopi – will only encourage Internet users to arm themselves with same encryption tools used by criminal networks, making their job of detecting threats and illegal activity that much harder.Read more »
Investigators "have identified several dozen Pentagon officials and contractors with high-level security clearances who allegedly purchased and downloaded child pornography, including an undisclosed number who used their government computers to obtain the illegal material.Read more »
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.Read more »
LIVE 7 Days a Week!
Mon-Sun: 7pm-10pm Eastern
Enjoy the new site and thanks for submitting your content!