President Obama, after announcing that North Korea hacked Sony according to the FBI, has followed with an attempt to calm the anger at North Korea. He declared last Sunday that in his opinion it wasn’t an act of war, but an act of “cybervandalism” and promises a “proportional” response. But you don’t have to look far to find a lot of skepticism about North Korea’s role in the attack from a lot of cybersecurity experts.
|By: msmolly Friday December 26, 2014 5:00 am|
|By: Kevin Gosztola Tuesday July 29, 2014 8:55 am|
Congress members and their staffers are blocked from accessing the website for the annual Hackers on Planet Earth (HOPE) conference, according to a screen shot Firedoglake obtained.
A staffer in Congress tried to access the website on July 28, more than a week after the tenth annual conference was held, and got a screen indicating the site had been categorized as a prohibited website.
|By: msmolly Friday July 18, 2014 5:23 pm|
Apparently our elected representatives have learned little from the Snowden revelations except to try to go underground to avoid public scrutiny of what they’re up to. They’re still trying to hand over our private information to the government — but now they’re keeping it vewy, vewy quiet.
|By: DSWright Tuesday July 2, 2013 3:20 pm|
The contractor the NSA pays to help hack your cell phone has an interesting history woven within the larger story of the explosive growth of cyberwarfare companies in the Post 9/11 era. The massive growth of the cyberweapons industry has been driven by governments, principally the United States, who in the name of defense have instigated an arms race for offensive weapons.
|By: Tom Engelhardt Monday June 17, 2013 2:55 pm|
As happens with so much news these days, the Edward Snowden revelations about National Security Agency (NSA) spying and just how far we’ve come in the building of a surveillance state have swept over us 24/7 — waves of leaks, videos, charges, claims, counterclaims, skullduggery, and government threats. When a flood sweeps you away, it’s always hard to find a little dry land to survey the extent and nature of the damage. Here’s my attempt to look beyond the daily drumbeat of this developing story (which, it is promised, will go on for weeks, if not months) and identify five urges essential to understanding the world Edward Snowden has helped us glimpse.
|By: DSWright Wednesday March 13, 2013 10:40 am|
We don’t want the smoking gun to be a 404 message. Recently the White House and Pentagon have kicked their program to terrorize sow fear into the general population with the threat of “cyberterrorism” into high gear. In fact, now the cyber threat is a bigger threat than actual terrorism. Some even insist that instead of allowing the phantoms to duel it out for budgetary relevance the nightmares can be synthesized to provide a great excuse for the government to attempt to control speech on the internet.
|By: Kevin Gosztola Monday February 25, 2013 3:00 pm|
Four days away from massive austerity that would result in cuts to the United States government, the Pentagon is suggesting the cuts would make it harder to fight cyber threats.
|By: Kevin Gosztola Wednesday February 13, 2013 9:31 am|
President Barack Obama signed a major cybersecurity executive order hours before he delivered his State of the Union address. The order was highlighted in his address as he spoke about the current threat he believes the government faces from cyber-attacks.
|By: Kevin Gosztola Monday February 11, 2013 8:55 am|
A classified intelligence assessment shows the United States is “the target of a massive, sustained cyber-espionage campaign that is threatening the country’s economic competitiveness,” according to the Washington Post.
|By: Kevin Gosztola Monday February 4, 2013 2:05 pm|
A recently published story from the New York Times reports a “secret legal review” has been conducted on the use of cyber warfare by the United States. It concluded President Barack Obama has “the broad power to order a preemptive strike if the United States detects credible evidence of a major digital attack looming from abroad.”