Not only did they plot to destroy WikiLeaks and discredit progressive bloggers, they also crafted detailed proposals for software that manages online "personas," allowing a single human to assume the identities of as many fake people as they'd like.
In a recent round of domain name seizures, the Justice and Homeland Security Departments shut down 84,000 websites that hadn't broken the law, falsely accusing them of child pornography crimes, according to TorrentFreak.
Rushkoff concluded that the Internet in its current form is simply unredeemable. From the near expulsion of WikiLeaks to Egypt's Internet blackout, it became clear to him that a fundamental change must be made.
The National Strategy for Trusted Identities in Cyberspace is expected to be finalized in the next few weeks, and its success will depend on the collaboration of a wide range of stakeholders in both the public and private sectors...
The roadmap [contains an] acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans.
The FBI urged members of the House Judiciary Subcommittee on Crime, Terrorism and Homeland Security on Thursday to update the Communications Assistance to Law Enforcement Act (CALEA) and make it easier for authorities to eavesdrop on Internet.
As far as mega corporations in bed with the government go, Google sits somewhere close to the top of the tree. The company was seeded with CIA money and is literally an a corporate arm of the intelligence community.
NIST’s technologists envision that consumers could use an identity credential, such as a smart card or digital certificate, to prove their identity for things such as online banking, without revealing sensitive information at every log-in.
As expected, Congress is holding hearings as it prepares to reintroduce COICA, a horribly written piece of legislation that effectively gives the US government more powers to censor websites (even beyond the DHS domain seizures)
Approximately 84,000 websites were shut down and wrongfully accused of having links to child pornography as part of "Operation Protect Our Children," a new joint operation between the Department of Homeland Security (DHS) and Department of Justice (D
“We must embed higher levels of security and authentication in hardware, operating systems, and network protocols,” Lynn said. The National Strategy for Trusted Identities in Cyberspace, a White House initiative, “will lay one building block...
It all stemmed from the government's attempts to get personal information from the Twitter accounts of three people linked to the WikiLeaks probe. Their lawyers argued that the data - screen names, mailing addresses, telephone numbers, credit card an
The new program, announced in January, has been greeted by skepticism about the role of government, the creation of new layers of bureaucracy, and possible government interference in the online activities of individual Americans.
Strengthening cybersecurity is the goal of legislation being introduced in Congress after reports of hack attacks on computer networks at Nasdaq OMX Group and at oil and gas companies.
"Cyber-threats are not on the horizon, they are upon us," Demo
The Obama administration is quietly seeking the power for it and other governments to veto future top-level domain names, a move that raises questions about free expression, national sovereignty, and the role of states in shaping the future of the In
When Hosni Mubarak shut down Egypt’s internet and cellphone communications, it seemed that all U.S. officials could do was ask him politely to change his mind. But the American military does have a second set of options, if it ever wants to force con
Media giant AOL Time Warner has posted the largest annual loss in US corporate history, while its single largest shareholder, Ted Turner, has thrown in the towel and resigned from his post as the company's vice president. What has gone wrong?
The current events in Egypt leave me very uncomfortable. Not the pro-democracy demonstrations — I support that in soul, mind and action — but the fact that the repressive regime is using surveillance technology developed by Western companies, mandate
As the United States authorities continue with their domain name seizure policy, file-sharing, streaming and link site operators around the world are looking for ways to mitigate this aggressive action. To this end, an Internet engineer and website o
Watch Streaming Broadcast Live:
Live Chat Telegram
Share this page with your friends
on your favorite social network: