06. 08. 2014
Off
Hacker using laptop. Lots of digits on the computer screen.

The FBI uses malware to combat online anonymity

Editor’s Note: Anonymity already compromised if using TOR – TOR Originally sponsored by the U.S. Naval Research Laboratory  Source: Engadget Online anonymity is a beautiful, terrible thing, so naturally governments and law enforcement types are eager to...

Read More →
04. 07. 2014
Off
16788372

German agent ‘spying for US’

Source: TheLocal.de UPDATE: Media reports on Friday said that an employee of Germany’s foreign intelligence service is suspected of spying for Washington on a parliamentary panel probing US surveillance. Media reports on Friday...

Read More →
29. 04. 2014
Off
circuit-board-brain-e1398796608532

A circuit board modeled on the human brain

              Source: Earth Sky Stanford bioengineers have developed a new circuit board modeled on the human brain, possibly opening up new frontiers in robotics and computing. For...

Read More →
23. 04. 2014
Off
400px-Flag_of_the_United_States_Federal_Bureau_of_Investigation.svg

FBI is said to gather data on foreign governments with hackers’ help

            Source: Brisbane Times An informant working for the FBI coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of...

Read More →
22. 04. 2014
Off
Alias

DARPA Is Developing The Ultimate Autopilot System

        Source: Fast Company One of the problems the military faces with several decades of working aircraft is that the command interfaces are all slightly different, therefore requiring them to...

Read More →
21. 04. 2014
Off
21MESH01-master675

Mesh Networks to avoid surveillance in Tunisia funded by U.S. State Department

          Editor’s Note: Any communication network funded by U.S. State Department and USAID  is a red flag. You should be asking yourself why the State Department is beta testing...

Read More →
25. 02. 2014
Off
DARPA

DARPA seeks to automate battlefield decision aids

Source: GCN Today’s battlefield commanders have a spectrum of flexible and powerful tools, including manned and unmanned platforms, weapons, sensors and electronic warfare systems that interact over robust satellite and tactical communications links....

Read More →
22. 02. 2014
Off
nextgov-medium

WELCOME TO ALGORITHMIC PRISON

  Source: NextGov Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they...

Read More →
23. 01. 2014
Off
oilrig1-680x400

U.S. GAS, OIL COMPANIES TARGETED IN ESPIONAGE CAMPAIGNS

Source: Threat Post American gas and oil companies have been targeted by a hacking group with ties to the Russian Federation for close to 18 months, a new research report indicates. The attackers...

Read More →
15. 01. 2014
Off
quantum leap

Mathematics of cyberwarfare

Source: PC Who says math won’t help you in the real world? Researchers at the University of Michigan believe they have calculated the optimum time for a cyber attack. The model, from student...

Read More →
02. 12. 2013
Off
Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Source: Ars Technica Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when...

Read More →
10. 10. 2013
Off
Exposed: the invisible conflict being waged by the world’s superpowers

Exposed: the invisible conflict being waged by the world’s superpowers

Source: Tech Radar The next world war will be online, and the consequences will be very real In the long Cold War between NATO and the Warsaw Pact, espionage was rife. Security services...

Read More →
24. 09. 2013
Off
Computer simulations reveal war drove the rise of civilisations

Computer simulations reveal war drove the rise of civilisations

Source: The Conversation According to British historian Arnold Toynbee, “History is just one damned thing after another.” Or is it? That is the question Peter Turchin of the University of Connecticut in Storrs...

Read More →
21. 08. 2013
Off
Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Source: jewish business news If you want to make it as a tech entrepreneur, enlist in the Israeli Defense Force and aim for Unit 8200. Unit 8200 runs Israel’s tech intel unit, it...

Read More →
20. 08. 2013
Off
Russia Setting up Cyber Warfare Unit Under Military

Russia Setting up Cyber Warfare Unit Under Military

Source: IBTimes Russia is beefing up its cyber security by creating a separate cyber warfare wing under the military. The army perceives that the internet could become the new theatre of war, says...

Read More →
03. 07. 2013
Off
How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

Source: MIT Technology Review Analysts believe that insurgents in Afghanistan form similar networks to street gangs in the US. So the software for analysing these networks abroad ought to work just as well...

Read More →
27. 05. 2013
Off
3-D printing will streamline the Navy’s supply chain — and much more

3-D printing will streamline the Navy’s supply chain — and much more

Source: AFJ Three-dimensional printing, a fast-moving technology that is still in its infancy, promises to upend the way we think about supply chains, sea basing and even maritime strategy. But it also requires...

Read More →
21. 05. 2013
Off
The future of propaganda:  big data will be a key part of the propaganda campaigns around the wars.

The future of propaganda: big data will be a key part of the propaganda campaigns around the wars.

Source: Gigaom In 2009, Sean Gourley, an Oxford-trained physicist, gave a TED talk called “The Mathematics of War.” Gourley had been working with the Pentagon, the United Nations and the Iraqi Government to help them better...

Read More →
16. 05. 2013
Off
U.S. could use cyberattack on Syrian air defenses

U.S. could use cyberattack on Syrian air defenses

Editor’s Note: Electronic Warfare : IDF’s teleprocessing corps C4i , Israel’s high-tech whiz kids, Unit 8200, and W32.Flame and Israel invests millions in drive for elite ‘cyber warriors’: Unit 8200 Source: USA Today The Pentagon has...

Read More →
15. 05. 2013
Off
‘Minority Report’ policing comes to the UK

‘Minority Report’ policing comes to the UK

Source: Telegraph Kent Police is using computer software to analyse historic offending and criminal behaviour to try and pinpoint where crimes will happen next. It is an echo of the Tom Cruise science...

Read More →
10. 05. 2013
Off
Electronic Warfare : IDF’s teleprocessing corps C4i

Electronic Warfare : IDF’s teleprocessing corps C4i

Source: JP “I’m directing EW at the head. This is also a form of psychological warfare. I can engage in this and then deny it. It wrecks the functionality of the enemy,” the...

Read More →
09. 05. 2013
Off
Training for war in a virtual battlespace

Training for war in a virtual battlespace

Source: TPP There is a sandstorm all around, and anything could be hidden up ahead in the haze of central Iraq. As a U.S. Army Humvee edges forward, a burst of gunfire erupts,...

Read More →
31. 03. 2013
Off
Predictive Policing Project: LAPD Pre-Crime Divisions

Predictive Policing Project: LAPD Pre-Crime Divisions

Source: AGE The morning watch at the Los Angeles Police Department’s Foothill division begins at 6am, when the shift’s officers gather for roll-call and a briefing. The dozen or so officers file into...

Read More →
19. 03. 2013
Off
Amazon Web Services to build CIA spook cloud

Amazon Web Services to build CIA spook cloud

Source:FCW In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up...

Read More →
16. 03. 2013
Off
Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Source: AP Bored with classes? Carnegie Mellon University and one of the government’s top spy agencies want to interest high school students in a game of computer hacking. Their goal with “Toaster Wars”...

Read More →
02. 03. 2013
Off
The Russian army is preparing for war in cyberspace

The Russian army is preparing for war in cyberspace

Source: R&I Cyberspace is rapidly becoming, if not a battlefield in the direct sense of the word, then a central arena for future wars. In this context, the decision by the Russian Ministry...

Read More →
21. 02. 2013
Off
Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Source: AP When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn’t have to consult with American diplomats in Beijing or...

Read More →
10. 02. 2013
Off
Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Source: Guardian A multinational security firm has secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites. A video obtained by the Guardian reveals...

Read More →
07. 02. 2013
Off
Who controls the Internet?

Who controls the Internet?

Source: Business Line Internet governance is an important policy and governance issue that has been raised at international level. Since the World Summit on Internet Society in 2003, nations have called for a...

Read More →
05. 02. 2013
Off
U.K. spy agencies plan to install Web snooping ‘black boxes’

U.K. spy agencies plan to install Web snooping ‘black boxes’

Source: ZDNET The ‘black box’ snooping devices would also be used to collect data from overseas companies, including U.S.-based service providers and social networks, such as Facebook, Google, and Twitter. The U.K.’s intelligence...

Read More →
04. 02. 2013
Off
U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

Source: Independent The US could launch pre-emptive cyber strikes against countries it suspects of threatening its interests with a digital attack, under a new set of secret guidelines to safeguard the nation’s computer...

Read More →
27. 01. 2013
Off
Pentagon to create National, Combat and Cyber Protection Mission Forces

Pentagon to create National, Combat and Cyber Protection Mission Forces

Source:SMH/WP The Pentagon has approved a major expansion of its cybersecurity force over the next several years, more than quadrupling its size to bolster the nation’s ability to defend critical computer systems and...

Read More →
23. 01. 2013
Off
China trying to encircle India via tech deals with neighbours: RAW

China trying to encircle India via tech deals with neighbours: RAW

Source: Times of India India should counter China’s move to build and run communication networks in its neighbourhood countries such as Nepal and Maldives, the telecom ministry and the national security establishment have...

Read More →
18. 01. 2013
Off
US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air

US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air

Source: Defense News It was right around that time that scientists began to turn their attention to another project: trying to access these protected networks remotely, through the air, by reading activity via...

Read More →
08. 01. 2013
Off
Cyber attack could defeat UK armed forces, MPs warned

Cyber attack could defeat UK armed forces, MPs warned

Source: Scotsman THE armed forces are now so dependent on information technology that their ability to operate could be “fatally compromised” by a sustained cyber attack, MPs warned yesterday. The Commons Defence Committee...

Read More →
03. 01. 2013
Off
It’s global cyber war out there

It’s global cyber war out there

Source: AFR Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on...

Read More →
10. 12. 2012
Off
Remember that MP3? The ITU police are en-route

Remember that MP3? The ITU police are en-route

Source: Voice of Russia In a very quiet release of information the Internet Warriors and “Hacktivist” Group Anonymous, has informed the world of one of the tools that will be used to bring...

Read More →
29. 10. 2012
Off
U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future

U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future

Source: Forbes In something that looks straight out of the CBS show “Person of Interest“, the science website Phsy.org is reporting on a potentially important breakthrough from researchers at Carnegie Mellon. In research...

Read More →
21. 10. 2012
Off
Cyber war targets Middle East oil and gas companies

Cyber war targets Middle East oil and gas companies

Source: Al Arabiya/AFP Middle Eastern oil and gas companies have been targeted in massive attacks on their computer networks in an increasingly open cyber war where a new virus was discovered just this...

Read More →
08. 10. 2012
Off
Mysterious Algorithm Was 4% of Trading Activity Last Week

Mysterious Algorithm Was 4% of Trading Activity Last Week

Source: CNBC A single mysterious computer program that placed orders — and then subsequently canceled them — made up 4 percent of all quote traffic in the U.S. stock market last week, according...

Read More →
17. 09. 2012
Off
United States linked to computer viruses used for espionage operations and cyber warfare.

United States linked to computer viruses used for espionage operations and cyber warfare.

Source: Reuters Researchers have found evidence suggesting that the United States may have developed three previously unknown computer viruses for use in espionage operations or cyber warfare. The findings are likely to bolster...

Read More →
22. 08. 2012
Off
Facebook, the CIA, DARPA, and the Tanking IPO

Facebook, the CIA, DARPA, and the Tanking IPO

Source: IB Times The big infusion of cash that sent Mark Zuckerberg and his fledgling college enterprise on their way came from Accel Partners, in 2004. Jim Breyer, head of Accel, attached a...

Read More →
15. 08. 2012
Off
Talk of Military Attack May Be Cover for Cyber War on Iran

Talk of Military Attack May Be Cover for Cyber War on Iran

Source: Arutz Sheva Journalists are scratching their heads to figure out why Israeli and American leaders are leading a daily chatter of a military attack on Iran, but the flow of words may...

Read More →
14. 08. 2012
Off
Executives advocate a military approach to cybersecurity

Executives advocate a military approach to cybersecurity

A new study being released by a private Internet security company highlights cyberworld weaknesses when it comes to gathering intelligence on hackers and suggests that businesses take a more military-minded approach to defense....

Read More →
09. 08. 2012
Off
Cyber surveillance virus Gauss found in region

Cyber surveillance virus Gauss found in region

Dubai: A new cyber surveillance virus, named Gauss, has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to Kaspersky Labs. “The virus is...

Read More →
09. 08. 2012
Off
NYPD launches new analytics tool for fighting terror, crime – Domain Awareness System

NYPD launches new analytics tool for fighting terror, crime – Domain Awareness System

Source: Computerworld New York City is using a new data aggregation and real-time analytics tool to combat crime and terror threats in the city. The new Domain Awareness System (DAS), developed jointly by...

Read More →
18. 07. 2012
Off
The war being waged on the web

The war being waged on the web

Source: Telegraph In the past five years, cyber and telecommunications defence has left its niche market to become one of the fastest growing industries in the world. In 2011, governments, industry and ordinary...

Read More →
17. 07. 2012
Off
‘Madi’ Cyber Espionage Campaign in Middle East Uncovered

‘Madi’ Cyber Espionage Campaign in Middle East Uncovered

Source IB Times The active cyber-espionage campaign is targetting very specific victims including employees of critical infrastructure companies, financial services and government embassies, which are mainly located in Middle Eastern countries. So far...

Read More →
05. 07. 2012
Off
U.S. Military Sharpens Preparation for Cyberwar

U.S. Military Sharpens Preparation for Cyberwar

The U.S. military is accelerating its cyberwarfare training programs in an aggressive expansion of its preparations for conflict on an emerging battlefield. The renewed emphasis on building up cyberwarfare capabilities comes even as...

Read More →
25. 06. 2012
Off
The secret labs where America’s most futuristic weapons are built

The secret labs where America’s most futuristic weapons are built

Source: The Week Stuxnet and Flame, two of the key covert computer viruses used in OLYMPIC GAMES, were likely developed at Ft. Meade, Md. At NSA headquarters, computer scientists successfully weaponized C++ and...

Read More →
24. 06. 2012
Off
The ‘cyber war’ era began long ago

The ‘cyber war’ era began long ago

Source: Malta Independent US military strategist John Boyd states: “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.” Cyber...

Read More →
21. 06. 2012
Off
Big Brother is watching Facebook and Twitter

Big Brother is watching Facebook and Twitter

Source: New Scientist SATIRICAL newspaper The Onion recently described Facebook as a project of the Central Intelligence Agency. “After years of secretly monitoring the public, we were astounded,” a fictional agency deputy director...

Read More →
17. 06. 2012
Off
What Facebook Knows

What Facebook Knows

Heading Facebook’s effort to figure out what can be learned from all our data is Cameron Marlow, a tall 35-year-old who until recently sat a few feet away from ­Zuckerberg. The group Marlow...

Read More →
16. 06. 2012
Off
Drones, computers new weapons of US shadow wars

Drones, computers new weapons of US shadow wars

Source: AP   After a decade of costly conflict in Iraq and Afghanistan, the American way of war is evolving toward less brawn, more guile. Drone aircraft spy on and attack terrorists with...

Read More →
09. 06. 2012
Off
Israel’s high-tech whiz kids, Unit 8200, and W32.Flame

Israel’s high-tech whiz kids, Unit 8200, and W32.Flame

Source: UPI Israel’s highly secretive Unit 8200 of Military Intelligence is increasingly seen to have played a leading role with the United States in developing a powerful new cyberweapon known as W32.Flame that...

Read More →
08. 06. 2012
Off
Mossad Wants Credit for Stuxnet

Mossad Wants Credit for Stuxnet

Source: The Atlantic Israel’s officials have a message for anyone praising the CIA for its sophisticated cyber attack on Iran: It was our baby. The Stuxnet computer worm, described by David Sanger in The New...

Read More →
06. 06. 2012
Off
Germany military prepares special unit to tackle cyber attack

Germany military prepares special unit to tackle cyber attack

Source: Economic Times   Germany has prepared a special cyber warfare unit of its military to conduct offencive operations against computer hackers, who attack key installations or engage in espionage activities, defence ministry...

Read More →
03. 06. 2012
Off
IDF admits to using cyber space to attack enemies

IDF admits to using cyber space to attack enemies

The IDF uses cyber space to gather intelligence, attack enemies and conduct various military operations, the military revealed on Sunday in a posting on its official website. The rare announcement was the first...

Read More →
31. 05. 2012
Off
It Looks Like The Devastating New Virus Ripping Through Iran Was A Joint US-Israel Attack

It Looks Like The Devastating New Virus Ripping Through Iran Was A Joint US-Israel Attack

Security researchers have linked the Flame virus to Israel while U.S. computer security experts say that it bears the hallmarks of the National Security Agency (NSA), according to reports from Nicole Perlroth of...

Read More →
30. 05. 2012
Off
Flame: The Skype-Sniffing, Bluetooth-Enabled Super Spy Tool Is A Harbinger

Flame: The Skype-Sniffing, Bluetooth-Enabled Super Spy Tool Is A Harbinger

The news from cybersecurity researchers this Memorial Day sounded like a plot device from a science fiction movie. A hyper-secret surveillance program laid dormant on computers around the world for years, secretly turning...

Read More →
09. 05. 2012
Off
Our innate desire to be free: The science of civil war

Our innate desire to be free: The science of civil war

Phantom Report Notes:  Foreign military forces conducting combat missions against indigenous armies in unfamiliar terrain using state of the art technology to lead the way will lose. I do not care if NATO...

Read More →
25. 04. 2012
Off
Occupy Sites Help Cops, Corps Track Occupiers

Occupy Sites Help Cops, Corps Track Occupiers

Big Data is everywhere. Occupy Wall Street protesters, however, are dealing with a special challenge: Online marketers and analytics firms tracing the minutiae of their lives–including their email contacts and physical location–and possibly...

Read More →
23. 04. 2012
Off
Iran cuts off Internet access to oil refineries following malware attack

Iran cuts off Internet access to oil refineries following malware attack

Iran’s Ministry of Oil has cut off Internet accessto six oil refineries following an apparent cyber attack targeting their networks, it was widely reported on Monday. Representatives of the ministry said it has...

Read More →
18. 04. 2012
Off
The CIA Wants Your Kids

The CIA Wants Your Kids

Source: Council on Foreign Relations [...] In an effort to counter some myths and misperceptions, create positive associations, and recruit future employees, eleven of the seventeen agencies of the IC have web pages...

Read More →
16. 04. 2012
Off
Google says snooping on Wi-Fi networks isn’t illegal

Google says snooping on Wi-Fi networks isn’t illegal

[...] The Times wrote about the FCC report: “Although a world leader in digital search capability, Google took the position that searching its employees’ e-mail ‘would be a time-consuming and burdensome task,’” the...

Read More →
15. 04. 2012
Off
Scientists to build ‘human brain’ Supercomputer

Scientists to build ‘human brain’ Supercomputer

This will be the last time I aggregate this Human Brain Supercomputer report until the project scientists actually build the damn thing. Almost to the year, the Daily Mail is recycling the same...

Read More →
12. 04. 2012
Off
Stuxnet worm reportedly planted by Iranian double agent using memory stick

Stuxnet worm reportedly planted by Iranian double agent using memory stick

Source: Ars Technica The Stuxnet computer worm used to sabotage Iran’s nuclear program was planted by a double agent working for Israel. The agent used a booby-trapped memory stick to infect machines deep...

Read More →
09. 04. 2012
Off
Iran plans to unplug the Internet, launch its own “clean” alternative

Iran plans to unplug the Internet, launch its own “clean” alternative

Source: Ars Technica ran topped a recent list of repressive regimes that most aggressively restrict Internet freedom. The list, published by Reporters Without Borders, is a part of the 2012 edition of the...

Read More →
04. 04. 2012
Off
German Police Have A Secret Hack To Monitor Computers And They’re Teaching It To The FBI

German Police Have A Secret Hack To Monitor Computers And They’re Teaching It To The FBI

Several international law enforcement agencies, including the FBI, held meetings with German police between 2008-12 to discuss the deployment of a monitoring software to covertly infiltrate computers, according to German government reports and...

Read More →
26. 03. 2012
Off
Megaupload claims US Military uploaded 94,245 gigabytes

Megaupload claims US Military uploaded 94,245 gigabytes

Source: Slash Gear In an interview two weeks ago, Kim Dotcom revealed to Torrentfreak that a number of Megaupload’s users were from the US government. In new emails, Dotcom has given exact details...

Read More →
23. 03. 2012
Off
Scary Fast Surveillance System Scans 36 Million Faces a Second

Scary Fast Surveillance System Scans 36 Million Faces a Second

Source: Gizmodo The new tech developed by Hitachi Kokusai Electric achieves super-fast speeds by processing video as it’s recorded—much like the facial recognition technology used in digital cameras. That means that once the...

Read More →
22. 03. 2012
Off
CYBERCOM Arming U.S. Combatant Commands

CYBERCOM Arming U.S. Combatant Commands

Once entirely controlled by the U.S. National Security Agency (NSA), offensive cyber weapons are making their way into the hands of the U.S. military’s geographic combatant commanders. The effort was alluded to by...

Read More →
22. 03. 2012
Off
Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)

Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)

A team of hackers from French security firm Vupen were playing by different rules. They declined to enter Google’s contest and instead dismantled Chrome’s security to win an HP-sponsored hackathon at the same...

Read More →
21. 03. 2012
Off
After Bales’ arrest, Pentagon tries to erase him from the Internet

After Bales’ arrest, Pentagon tries to erase him from the Internet

Source: Seattle Times Besides waiting nearly a week before identifying the Joint Base Lewis-McChord staff sergeant suspected of killing 16 Afghan villagers, the U.S. military scrubbed its websites of references to his combat...

Read More →
19. 03. 2012
Off
US to fast-track cyber weapons

US to fast-track cyber weapons

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not connected to the Internet, according to current and former...

Read More →
15. 03. 2012
Off
ff_nsadatacenter3_f

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of...

Read More →
15. 03. 2012
Off
Super-Secret Google Builds Servers in the Dark

Super-Secret Google Builds Servers in the Dark

ust how far will Google go to hide its custom-built data-center hardware from the rest of the world? In one Silicon Valley data center, the company is apparently so paranoid about competitors catching...

Read More →
12. 03. 2012
Off
Real-time face recognition comes to your iPhone camera

Real-time face recognition comes to your iPhone camera

Source: KITV ABC Called “Klik,” the iPhone app automatically displays your friends’ names in real time when they appear in view of your iPhone’s camera. After Klik detects a face, it instantly connects...

Read More →
12. 03. 2012
Off
Surveillance Inc: How Western Tech Firms Are Helping Arab Dictators

Surveillance Inc: How Western Tech Firms Are Helping Arab Dictators

Do not be a fool. Western Tech Firms are spying on everyone. FYI: NYC’s Ring of Steel Part 1 and 2 IARPA wants to sweep social media and public cameras to predict future...

Read More →
12. 03. 2012
Off
New York City Subpoenas Twitter For Occupy Wall Street Protester Data

New York City Subpoenas Twitter For Occupy Wall Street Protester Data

U.S. activists who thought Twitter was a secure way to communicate during demonstrations may have another thing coming. The New York District Attorney’s Office has begun sending subpoenas to Twitter seeking data on...

Read More →
08. 03. 2012
Off
China testing cyber-attack capabilities

China testing cyber-attack capabilities

For a decade or more, Chinese military officials have talked about conducting warfare in cyberspace, but in recent years they have progressed to testing attack capabilities during exercises, according to a congressional report...

Read More →
06. 03. 2012
Off
IBM’s Watson Gets Wall Street Job After ‘Jeopardy’ Win

IBM’s Watson Gets Wall Street Job After ‘Jeopardy’ Win

International Business Machines Corp. (IBM)’s Watson computer, which beat champions of the quiz show “Jeopardy!” a year ago, will soon be advising Wall Street on risks, portfolios and clients. Citigroup Inc. (C), the...

Read More →
05. 03. 2012
Off
Stuxnet: Computer worm opens new era of warfare

Stuxnet: Computer worm opens new era of warfare

Stuxnet code is not as abstract as portrayed. It is obvious from the 60 minutes report that Stuxnet was coded and launched  by US and Israeli intelligence . ——————————————————————————————————————————————————   “We have entered...

Read More →
02. 03. 2012
Off
The traffic intersection of the future – busy, computer controlled and very nerve-wracking

The traffic intersection of the future – busy, computer controlled and very nerve-wracking

The technology behind autonomous driving is advancing by the day, with engineers at General Motors believing that in 10 to 15 years time, cars that don’t require us to control them in the...

Read More →
01. 03. 2012
Off
Genetic algorithms let Chinese drones hunt submarines

Genetic algorithms let Chinese drones hunt submarines

Source: New Scientist Chinese navy researchers have revealed how they plan to hunt submarines using ship-launched uncrewed air vehicles (UAVs). The plan, developed by the naval academy in Dalian, China, is to choose...

Read More →
29. 02. 2012
Off
Ireland Signs Controversial ‘Irish SOPA’ Into Law; Kicks Off New Censorship Regime

Ireland Signs Controversial ‘Irish SOPA’ Into Law; Kicks Off New Censorship Regime

Source: Techdirt Remember how EMI sued the Irish government for failing to pass a SOPA-like law that will force ISPs to act as copyright cops and censor and block access to websites that...

Read More →
29. 02. 2012
Off
Russian Mogul’s Plan: Plant Our Brains in Robots, Keep Them Alive Forever

Russian Mogul’s Plan: Plant Our Brains in Robots, Keep Them Alive Forever

Itskov’s project, also called “Avatar,” actually precedes the Pentagon’s. He launched the initiative a year ago, but recently divulged more details to a group of futurists — including Ray Kurzweil — at a...

Read More →
28. 02. 2012
Off
Ford boss: the self-driving car is essential — and coming soon

Ford boss: the self-driving car is essential — and coming soon

Ford believes the move towards such high-tech cars will happen in three stages: Near-term – In the next five years, he said vehicles will be equipped with car-to-car warning systems and will be...

Read More →
28. 02. 2012
Off
Facebook ID cards: AKA Internet ID Card

Facebook ID cards: AKA Internet ID Card

Governments are slowly nudging society to controlled internet hubs to spy, collect and profile us by our digital data , such as Facebook. Facebook ID is fictitious as of now, but an internet...

Read More →
27. 02. 2012
Off
Pakistan plans system to filter and block websites

Pakistan plans system to filter and block websites

Pakistan has floated a request for proposal for a system to filter and block websites, some months after curbing the use of encryption on the Internet, and toying with the idea of filtering...

Read More →
27. 02. 2012
Off
Wikileaks Stratfor Memo Reminiscent of a Spy Novel

Wikileaks Stratfor Memo Reminiscent of a Spy Novel

Reminiscent of a non-fiction spy novel involving military industrial complex, government agencies and wall street    The document is allegedly Friedman’s own wry rundown of intelligence lingo that his employees use in their...

Read More →
24. 02. 2012
Off
Schneier: government, apple, google, facebook…, big data pose bigger ‘Net threat than criminals’

Schneier: government, apple, google, facebook…, big data pose bigger ‘Net threat than criminals’

As Bruce Schneier spent the past decade watching the growing rash of phishers, malware attacks, and identity theft, a new Internet threat has emerged that poses even greater risks, the security expert said....

Read More →
21. 02. 2012
Off
CIA to software vendors: A revolution is coming

CIA to software vendors: A revolution is coming

Source: Reuters The U.S. Central Intelligence Agency told software vendors on Tuesday that it plans to revolutionize the way it does business with them as part of a race to keep up with...

Read More →
21. 02. 2012
Off
London Ads Target Female Shoppers With Facial-Recognition Tech

London Ads Target Female Shoppers With Facial-Recognition Tech

The trial usage of the facial recognition advertising system will reportedly be limited to two weeks and will only show up on one street in London, for now. As for gender-specific ad targeting,...

Read More →
21. 02. 2012
Off
NSA: Anonymous Hired by Al Qaeda Could Cause Power Outages Through Cyberattacks

NSA: Anonymous Hired by Al Qaeda Could Cause Power Outages Through Cyberattacks

NSA psychologically implanting ideas in your head so when they launch a future false flag cyber operation  you already have your mind made up who is responsible. Anonymous  hired by al Qaeda. Source:...

Read More →
17. 02. 2012
Off
Nevada gives green light to self-driving cars

Nevada gives green light to self-driving cars

The state’s legislature on Wednesday approved regulations for self-driving vehicles, the first state in the country to do so. “These regulations establish requirements companies must meet to test their vehicles on Nevada’s public...

Read More →
16. 02. 2012
Off
Guarding Ground Zero: A look at the amazing and terrifying artificial intelligence that will protect the new World Trade Center

Guarding Ground Zero: A look at the amazing and terrifying artificial intelligence that will protect the new World Trade Center

Unfortunately, the rebuilding of the World Trade Center also reestablishes it as Target #1 for would-be terrorist. To combat this gruesome threat, the Port Authority of New York and New Jersey, and other...

Read More →
16. 02. 2012
Off
Nanosecond Trading Could Make Markets Go Haywire

Nanosecond Trading Could Make Markets Go Haywire

The programs are designed to trade enormous volumes of stocks, bonds and other financial instruments at superfast speeds, taking advantage of second-to-second fractional price shifts and market trends. It’s now estimated that high-frequency...

Read More →
16. 02. 2012
Off
From encryption to darknets: As governments snoop, activists fight back

From encryption to darknets: As governments snoop, activists fight back

“Spooks are listening into calls, just like they always have,” said Eric King of London’s Privacy International, in an e-mail. “With A5/1 being broken—you can decrypt and listen into 60 calls at once...

Read More →
16. 02. 2012
Off
Obama Launching Technology Field Office

Obama Launching Technology Field Office

Source: San Francisco Chronicle So this week, The Chronicle has learned that the Obama campaign has, for the first time, opened a new type of campaign office in San Francisco: A Technology Field...

Read More →
Pages:123»