Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Wikileaks publishes CIA chief’s personal information

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, Fraud, IT and Politics, IT Security.

“WikiLeaks on Wednesday published personal information of CIA Director John Brennan after a brazen hack attack of the top spy’s personal email account.” says CNN Source: CNN Date: October 21st, 2015 Link: http://us.cnn.com/2015/10/21/politics/john-brennan-hacked-cia-director/index.html Discussion 1) The CIA is saying that the hacking of the Director of the CIA’s e-mail “is something that could happen to anyone”.  Do you… Read more »

Microsoft battles US over warrant for drugs case emails

Posted by & filed under Civil Liberties, Cloud Computing, IT and Politics, Uncategorized.

Microsoft is returning to court to continue its fight against the US government’s demand that it hand over emails stored at an Irish data centre.  The messages involved are alleged to contain details of narcotics sales.  In 2014, a court ruled in favour of the government’s claim that because it had jurisdiction over the US-based… Read more »

Google Could Rig the Next Election

Posted by & filed under Business Analytics, Business Intelligence, Fraud, IT and Politics.

By manipulating its search results, Google could decide the next election. The world’s most-used search engine is so powerful and national elections are so tight, that even a tiny tweak in Google’s (GOOGL, Tech30) secret algorithm could swing the 2016 presidential election, according to Robert Epstein, senior research psychologist at the American Institute for Behavioral… Read more »

How the U.S. thinks Russians hacked the White House

Posted by & filed under Cyber Security, IT and Politics, IT Security, Security.

Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only ever affected an unclassified system, that description belies the seriousness of… Read more »

More than a billion emails at State Department, but few saved

Posted by & filed under Ethical issues, IT and Politics.

The State Department’s government watchdog has released a review of its email record-keeping practices and concluded that the vast majority of emails sent by State personnel are not being preserved, possibly in violation of the Federal Records Act. Out of the billion emails sent by personnel in 2011, the Office of the Inspector General found… Read more »

U.S. planes spy on American phones

Posted by & filed under Cyber Security, IT and Politics, IT Security.

The Federal government gathers the data from Cessna airplanes and can cover most of the U.S. population. These devices typically trick phones into sharing its location data and revealing the phone’s identity. CNNMoney has independently confirmed that at least one federal agency, Immigration and Customs Enforcement, has used this technology on planes since 2010, according… Read more »

The U.S. government thinks China could take down the power grid

Posted by & filed under Cyber Security, IT and Politics, IT Security, IT Strategy.

China and “probably one or two other” countries have the capacity to shut down the nation’s power grid and other critical infrastructure through a cyber attack, the head of the National Security Agency told a Congressional panel Thursday. Admiral Michael Rogers, who also serves the dual role as head of U.S. Cyber Command, said the… Read more »