Last month, the FBI was ordered to reveal the full malware code used to hack visitors of a dark web child pornography site. The judge behind that decision, Robert J. Bryan,said it was a “fair question” to ask how exactly the FBI caught the defendant. But the agency is pushing back. On Monday, lawyers for…
Category: Cyber-Security
Cyber-Crime: Why Hospitals Are The Perfect Targets For Ransomware
RANSOMWARE HAS BEEN an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That’s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities. The malware works by locking your computer to prevent you from accessing data until you pay a…
Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare
Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….
Espionage Files: The Brave New World of Drone Hacking
The Israel Police and Shin Bet security service arrested a Gaza resident suspected of hacking into the feeds from Air Force drones and collecting information on troop movements and civilian flights for the Palestinian Islamic Jihad terror group, police said Wednesday. A police statement named the suspect as Majd Ouida, 22, describing him as an…
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
In the FBI’s Crypto War, Apps May Be The Next Target
IF THERE’S ANYTHING the world has learned from the standoff over the encrypted iPhone of San Bernardino killer Syed Rizwan Farook, it’s that the FBI doesn’t take no for an answer. And now it’s becoming clear that the government’s determination to access encrypted data doesn’t end with a single iPhone, or with Apple, or even…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
Fingerprint Spoofing: Yeah there’s An App for That
So That Thumbprint Thing on Your Phone Is Useless Now Researchers found a cheap, easy way to copy your fingerprints a few months after millions of Americans had theirs stolen by hackers. Last year, when the Office of Personnel Management notified 22 million people that their personal information was compromised in a massive data breach, one…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…
Going Inside the Ukrainian Power Grid Hack
IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…
