President Obama, after announcing that North Korea hacked Sony according to the FBI, has followed with an attempt to calm the anger at North Korea. He declared last Sunday that in his opinion it wasn’t an act of war, but an act of “cybervandalism” and promises a “proportional” response. But you don’t have to look far to find a lot of skepticism about North Korea’s role in the attack from a lot of cybersecurity experts.
|By: msmolly Friday December 26, 2014 5:00 am|
|By: Kevin Gosztola Thursday July 31, 2014 10:13 am|
An investigation by the CIA inspector general has confirmed CIA employees hacked into computers being used by the Senate intelligence committee to produce a 6,300-page torture report, according to McClatchy Newspapers.
Journalists Jonathan Landay and Ali Watkins obtained a statement from CIA spokesman Dean Boyd, who indicated, “Findings of the investigation by the CIA Inspector General’s Office ‘include a judgment that some CIA employees acted in a manner inconsistent with the common understanding reached between SSCI (Senate Select Committee on Intelligence) and the CIA in 2009.”
|By: Kevin Gosztola Tuesday July 29, 2014 8:55 am|
Congress members and their staffers are blocked from accessing the website for the annual Hackers on Planet Earth (HOPE) conference, according to a screen shot Firedoglake obtained.
A staffer in Congress tried to access the website on July 28, more than a week after the tenth annual conference was held, and got a screen indicating the site had been categorized as a prohibited website.
|By: Kevin Gosztola Monday April 7, 2014 9:02 am|
US government officials realized that hypocrisy had been exposed. Both countries could now be said to engage in hacking. As one senior administration official said to the Times, “We clearly don’t occupy the moral high ground that we once thought we did.”
|By: DSWright Monday December 30, 2013 7:15 am|
The German Magazine Der Spiegel has published an article that details one of the National Security Agency’s most powerful operations units – the Office of Tailored Access Operations (TAO). According to the report TAO is a special unit that is called in when other units’ access to a target is blocked. The “digital plumbers” are called in to unblock or hack in to the target.
|By: Kevin Gosztola Monday November 11, 2013 3:30 pm|
One wonders how the FISC decided to spy on Saudi Arabia’s OPEC governor and what pretext the NSA used to gain authorization. The authorization would likely demonstrate the broad power granted by the court to the NSA to collect “foreign intelligence” for “national security” purposes.
|By: cmaukonen Saturday November 2, 2013 12:53 pm|
While everyone is concerned about what secrets and communications are being snooped upon by our and other government agencies, a situation more sinister than that of what Germany’s Merkel is talking about has been uncovered by one of computer security’s most notable people.
|By: DSWright Monday October 28, 2013 10:47 am|
Today in New Jersey, US Attorney Paul Fishman brought charges against a man for hacking into government computers in order to steal information on government employees. The man now arrested and indicted, Lauri Love, said the purpose of the hack and theft was to “disrupt the operations and infrastructure of the United States government.” Love is a native of England but was arrested in New Jersey.
|By: DSWright Thursday February 21, 2013 9:09 am|
Lawrence Lessig marked his appointment as Roy L. Furman Professor of Law and Leadership at Harvard Law School with a lecture titled “Aaron’s Laws: Law and Justice in a Digital Age.”
The lecture focuses on the Aaron Swartz case which Lessig says he approaches less as an intellectual and more as a citizen and friend given his extensive personal history with Swartz.
|By: Phoenix Woman Wednesday February 20, 2013 5:45 am|
What the NYT won’t tell you, Huffington Post will — namely, that Mandiant’s researchers credit Anonymous with providing the big break needed to crack the case.