БЛОГ

Archive for the ‘privacy’ category: Page 25

Feb 11, 2016

UK lawmakers slam government plan to scoop up data

Posted by in category: privacy

UK cracking down on their government’s eaves dropping efforts.


The British government’s bill that calls for far-reaching data collection powers gets slammed in parliament. Critics say it would be most intrusive collection regime among Western democracies.

Read more

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more

Feb 4, 2016

NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption

Posted by in categories: computing, encryption, information science, privacy, quantum physics, security

Another article just came out today providing additional content on the Quantum Computing threat and it did reference the article that I had published. Glad that folks are working on this.


The NSA is worried about quantum computers. It warns that it “must act now” to ensure that encryption systems can’t be broken wide open by the new super-fast hardware.

In a document outlining common concerns about the effects that quantum computing may have on national security and encryption of sensitive data, the NSA warns that “public-key algorithms… are all vulnerable to attack by a sufficiently large quantum computer.”

Continue reading “NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption” »

Feb 3, 2016

NSA Says it “Must Act Now” Against the Quantum Computing Threat

Posted by in categories: computing, encryption, privacy, quantum physics, security

NSA states it must act now against the “Quantum Computing Threat” due to hackers can possess the technology. I wrote about this on Jan 10th. Glad someone finally is taking action.


The National Security Agency is worried that quantum computers will neutralize our best encryption – but doesn’t yet know what to do about that problem.

Read more

Jan 29, 2016

USENIX Enigma 2016 — NSA TAO Chief on Disrupting Nation State Hackers

Posted by in categories: habitats, privacy, security

Rob Joyce, Chief, Tailored Access Operations, National Security Agency.

From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.

Continue reading “USENIX Enigma 2016 — NSA TAO Chief on Disrupting Nation State Hackers” »

Jan 29, 2016

Imagining Football’s Future Through the Super Bowl of 2066

Posted by in categories: food, privacy, robotics/AI, transportation, wearables

Scalpers offered contact lenses guaranteed to fool any ocular-based biometric ticketing technology.

He was right, of course, which explains all those people arriving at the stadium in all the usual ways. Some came by autonomous cars that dropped them off a mile or more from the stadium, their fitness wearables synced to their car software, both programmed to make their owner walk whenever the day’s calories consumed exceeded the day’s calories burned. Others turned up on the transcontinental Hyperloop, gliding at 760 miles per hour on a cushion of air through a low-pressure pipeline, as if each passenger was an enormous bank slip tucked into a pneumatic tube at a drive-through teller window in 1967. That was the year the first Super Bowl was played, midway through the first season of Star Trek, set in a space-age future that now looks insufficiently imagined.

And so hours before Super Bowl 100 kicked off—we persist in using that phrase, long after the NFL abandoned the actual practice—the pregame scene offered all the Rockwellian tableaux of the timeless tailgate: children running pass patterns on their hoverboards—they still don’t quite hover, dammit—dads printing out the family’s pregame snacks, grandfathers relaxing in lawn chairs with their marijuana pipes.

Read more

Jan 28, 2016

How to Make Your Own NSA Bulk Surveillance System

Posted by in category: privacy

Existing off-the-shelf components are all you need to spy like the NSA, says a UC Berkeley researcher.

Read more

Jan 14, 2016

Ex-NSA Boss Says FBI is wrong on Encryption

Posted by in categories: computing, encryption, government, privacy, security, software

Ex-NSA boss says FBI director is wrong on encryption

Continue reading “Ex-NSA Boss Says FBI is wrong on Encryption” »

Nov 24, 2015

Biometric ‘tech tattoos’ could be the future of wearables

Posted by in categories: health, privacy

A development firm in Austin, Texas is working on wearable health monitors that come in the form of temporary tattoos.

Read more

Nov 15, 2015

The Pentagon’s plan to outsource lethal cyber-weapons

Posted by in categories: cybercrime/malcode, military, privacy

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

Page 25 of 30First2223242526272829Last