SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….
Category: Cyber-Skills
Cyber-News: How To Hack An Election
Andrés Sepúlveda rigged elections throughout Latin America for almost a decade. He tells his story for the first time. It was just before midnight when Enrique Peña Nieto declared victory as the newly elected president of Mexico. Peña Nieto was a lawyer and a millionaire, from a family of mayors and governors. His wife was…
Modern Crime: Fed’s Try To Unlock Phones Because of Drugs NOT Terrorism
UNTIL THE FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen a near-perfect case on which to make its stand against encryption. By refusing to write software to help law enforcement crack Farook’s phone, Apple was made to…
Cyber-News: FBI Is Pushing Back Against Judge’s Order to reveal TOR Browser Exploit
Last month, the FBI was ordered to reveal the full malware code used to hack visitors of a dark web child pornography site. The judge behind that decision, Robert J. Bryan,said it was a “fair question” to ask how exactly the FBI caught the defendant. But the agency is pushing back. On Monday, lawyers for…
Cyber-Crime: Why Hospitals Are The Perfect Targets For Ransomware
RANSOMWARE HAS BEEN an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That’s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities. The malware works by locking your computer to prevent you from accessing data until you pay a…
Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare
Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
Crusader Corner: Tracking Down Salah Abdeslam
Man Hunting, The Sport of Security Forces Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS’ rapid and haphazard operational tempo. Clandestine operatives must rely on support networks that include overt members of the public. These networks are easily mapped out based on metadata available to nation state…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…