Home » Entries posted by Flash Critic (Page 3)
Stories written by Flash Critic

Silencing the Messenger: Communication Apps Under Pressure

Internet freedom has declined for the sixth consecutive year, with more governments than ever before targeting social media and communication apps as a means of halting the rapid dissemination of information, particularly during anti-government protests. Public-facing social media platforms like Facebook and Twitter have been subject to growing censorship for several years, but in a new trend, governments increasingly target voice communication and messaging apps such as WhatsApp and Telegram. These services are able to spread information and connect users quickly and securely, making it more difficult for authorities to control…

The Cyber Threat: Congress should investigate failed Obama cyber policies and Russian hacking

The Cyber Threat: Congress should investigate failed Obama cyber policies and Russian hacking

By Bill Gertz 
  President Obama, under pressure from Congress, has directed U.S. intelligence agencies to conduct a deep-dive inquiry into Russian cyber attacks and their impact on the 2016 presidential election and to provide the results before Inauguration Day. 
  Any intelligence review should coincide with a companion investigation by Congress into why the president and his White House advisers for the past eight years rejected numerous calls from military, intelligence, and national security advisers to take aggressive action against states like Russia and China—action that could have prevented the kind…

Pentagon links Chinese cyber security firm to Beijing spy service

A Chinese cyber security firm is covertly working with Beijing’s Ministry of State Security intelligence service in conducting cyber espionage operations, according to Pentagon intelligence officials. The company known as Boyusec, officially the Bo Yu Guangzhou Information Technology Co., is also working with China’s global telecommunications company Huawei Technologies, which has been identified by U.S. intelligence agencies as linked to the Chinese military. According to an internal report by the Pentagon’s Joint Staff J-2 intelligence directorate, Boyusec and Huawei are working together to produce security products that will be loaded into Chinese-manufactured…

FBI, Pentagon counterspies hunt fraudulent Navy contractor

Counterintelligence agents from the FBI and Pentagon are pursuing a suspected foreign agent posing as a Navy officer who offered fraudulent contracts to defense contractors in a bid to obtain sensitive and embargoed American technology. The FBI on Wednesday sent a security alert about the scam uncovered recently by a contractor in Massachusetts to contractors engaged in secret defense work. An FBI counterintelligence agent stated in the alert that the contractor reported “an individual posing as U.S. Navy officer” was issuing fake Navy contracts for computer and telecommunications equipment. Full story…
The Washington…

Cyber security, nuclear modernization top Trump defense priorities

President-elect Donald Trump’s national security priorities are modernizing the aging U.S. nuclear arsenal and securing critical infrastructure from cyber attacks. According to Greatagain.gov, the presidential transition website opened Thursday, Trump also appears to have shifted rhetoric on terrorism. During the campaign, Trump loudly proclaimed radical Islam to be the key driver of terrorism. The transition website, however, refers only to “radical ideologies” as the inspiration behind the long-term threat of terrorism. Trump criticized the Obama administration during the campaign for its failure to use the term radical Islam in countering Muslim terrorism…

Securing ‘The Internet of Things’

The Department of Homeland Security issued a report this week outlining ways the Internet of Things can be made more secure. The Internet of Things, or IoT, includes millions of networked devices ranging from video cameras to television digital video recorders all connected to the internet. Unlike computers and handheld devices, most IoT devices lack security and can be easily hacked. Evidence surfaced last month of a major IoT hack of the domain name service company Dyn, which suffered a multiple-wave cyberattack that temporarily shut down its servers during a massive denial-of-service…

The perfect weapon: How Russian Cyber power invaded the U.S.

When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally, to the help desk. His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named “the Dukes,” a cyberespionage team linked to the Russian government. The F.B.I. knew it well: The bureau had spent the last few years trying to kick the Dukes out of the…

WikiLeaks figure says ‘disgusted’ Democrat leaked Clinton campaign emails

A WikiLeaks figure is claiming that he received leaked Clinton campaign emails from a “disgusted” Democratic whistleblower, while the White House continued to blame Russian hackers Wednesday for meddling in the presidential election and asserted that Donald Trump was “obviously aware” of Moscow’s efforts on his behalf. Craig Murray, a former British ambassador to Uzbekistan and a close associate of WikiLeaks founder Julian Assange, said in the report by the Daily Mail that he flew to Washington for a clandestine handoff with one of the email sources in September. He said he…