Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] FBI Data Mining Encompasses Everything and Everyone

  • Subject: [News] FBI Data Mining Encompasses Everything and Everyone
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Fri, 25 Sep 2009 17:01:39 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Newly Declassified Files Detail Massive FBI Data-Mining Project

,----[ Quote ]
| A fast-growing FBI data-mining system billed as a tool 
| for hunting terrorists is being used in hacker and 
| domestic criminal investigations, and now contains tens 
| of thousands of records from private corporate 
| databases, including car-rental companies, large hotel 
| chains and at least one national department store, 
| declassified documents obtained by Wired.com show.
`----

http://www.wired.com/threatlevel/2009/09/fbi-nsac/

MI5 Hires Teenagers to Battle Cyber Terrorism

,----[ Quote ]
| MI5 has hired 50 computer-savvy hackers â some of them 
| still teenagers â to work in a newly formed top secret 
| Cyber Operations Command.
`----

http://www.express.co.uk/posts/view/128603/MI5-hires-teenagers-to-battle-cyber-terrorism

Just valuable to know.


Recent:

FBI used spyware to catch cable-cutting extortionist

,----[ Quote ]
| CIPAV spyware helped nab unemployed engineer angry over outsourcing
`----

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM


Congress Ponders Cybersecurity Power Grab

,----[ Quote ]
| There was a lot of attention paid last week to a new "cybersecurity" bill
| that would drastically expand the government's power over the Internet. The
| two provisions that have probably attracted the most attention are the parts
| that would allow the president to "declare a cybersecurity emergency" and
| then seize control of "any compromised Federal government or United States
| critical infrastructure information system or network." Perhaps even more
| troubling, the EFF notes a section that states that the government "shall
| have access to all relevant data concerning (critical infrastructure)
| networks without regard to any provision of law, regulation, rule, or policy
| restricting such access."
`----

http://techdirt.com/articles/20090403/1346154383.shtml


Related:

Cryptome: NSA has access to Windows Mobile smartphones

,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSAâs network surveillance.
`----

http://blogs.securiteam.com/index.php/archives/1028


Dual_EC_DRBG Added to Windows Vista

,----[ Quote ]
| Microsoft has added the random-number generator Dual_EC-DRBG to Windows
| Vista, as part of SP1. Yes, this is the same RNG that could have an NSA
| backdoor.
|
| It's not enabled by default, and my advice is to never enable it. Ever.
`----

http://www.schneier.com/blog/archives/2007/12/dual_ec_drbg_ad.html


Microsoft Cofee brews 'back door' fears

,----[ Quote ]
| The assurances came after reports claiming that Cofee could provide a 'back
| door' into Microsoft operating systems and applications.
`----

http://www.itnews.com.au/News/75780,microsoft-cofee-brews-back-door-fears.aspx


Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----

http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkq86WMACgkQU4xAY3RXLo5fLwCeJ/NWqmKXzbzTwGFe8wFrPtFN
9MoAoIyLg6ySnLp3t04sp8e3LHaC0qjR
=HADK
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index