In 2011, the Bush administration authorized — almost certainly illegally — the NSA to conduct bulk electronic surveillance on Americans: phone calls, e-mails, financial information, and so on.
In 2013, in the early days of the Snowden leaks, Harvard Law School professor and former Assistant Attorney General Jack Goldsmith reflected on the increase in NSA surveillance post 9/11. He wrote : Two important lessons of the last dozen years are (1) the government will increase its powers to meet the national security threat fully (because the People demand it), and (2) the enhanced powers will be accompanied by novel systems of review and transparency that seem to those in the Executive branch to be intrusive and antagonistic to the traditional national security mission, but that in the end are key legitimating factors for the expanded authorities
CryptoWall and its variants are among the best-known types of ransomware, malware that encrypts files on end user hard drives and then prompts for payment of a ransom to decrypt the files. In many cases, if users don’t have recent backups, thei…
Original release date: October 12, 2015 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT).
There was an advert for weed-killer a while back, the tagline was something along the lines of ‘Kill the root, kill the weed’. That’s true of many problems, better to get to the heart of the issue and deal with it there, rather than repeatedly treating its symptoms.
Several times I’ve mentioned Peter Swire’s concept of “the declining half-life of secrets.” He’s finally written it up : The nature of secrets is changing. Secrets that would once have survived the 25 or 50 year test of time are more and more prone to leaks. The declining half-life of secrets has implications for the intelligence community and other secretive agencies, as they must now wrestle with new challenges posed by the transformative power of information technology innovation as well as the changing methods and targets of intelligence collection
7 retweets 4 favorites
2 retweets 0 favorites
0 retweets 0 favorites
0 retweets 0 favorites