-
26 -- Second test of the water and Africa story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
EncryptionUSMobile launches Scrambl3 mobile, Top Secret communication-standard app
Irvine, California-based USMobile, a developer of private mobile phone services, yesterday launched Scrambl3, a smartphone app that enables users to create their own Private Mobile Network. When Scrambl3 users communicate with each other, Scrambl3 creates a Dark Internet Tunnel between their smartphones. This Tunnel cloaks the calls and texts by making them invisible on the Internet. Scrambl3 App for Android-based phones is available for a 60-day free beta offering from the Google Play Store.
-
-
EncryptionTech companies urge rejection of push by FBI, DOJ for electronic devices “backdoors”
In a 19 May letter to President Barack Obama, a group of Silicon Valley tech companies, cyber-security experts, and privacy advocacy groups urged the president to reject the implementation of “backdoors” in smartphone and computer encryption. The letter offered evidence of the strong objection of the tech industry to demands from the Justice Department and the Federal Bureau of Investigation (FBI) to allow secret backdoor passages into consumer electronics, which would make it possible for law enforcement to read encrypted private communications and data.
-
-
Quantum encryptionQuantum cryptography one step closer as researchers design first all-photonic repeaters
Imagine having your MRI results sent directly to your phone, with no concern over the security of your private health data. Or knowing your financial information was safe on a server halfway around the world. Or sending highly sensitive business correspondence, without worrying that it would fall into the wrong hands. Thanks to new research, these types of perfectly secure information exchanges are one step closer to reality, as researchers have designed the first all-photonic quantum repeaters — protocols that ensure data can be carried reliably and securely across longer distances when using quantum cryptography.
-
-
CybersecurityThwarting the next generation of cyberattacks
The next generation of cyberattacks will be more sophisticated, more difficult to detect, and more capable of wreaking untold damage on the nation’s computer systems. So the U.S. Department of Defense has given a $3 million grant to a team of computer scientists from the University of Utah and University of California, Irvine, to develop software that can hunt down a new kind of vulnerability that is nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart so-called algorithmic attacks that target the set of rules or calculations that a computer must follow to solve a problem.
-
-
CybersecurityPolice department pays ransom after hackers encrypt department’s data
Last December, cyberterrorists hacked into servers belonging to the Tewksbury Police Department, encrypted the data stored, and later asked for a $500 bitcoin ransom to be paid before department officials could regain control of their files. The attack is known as the CryptoLocker ransomware virus, and it points to a new frontier in cyberterrorism.
-
-
EncryptionNew encryption code to take on toughest of cyber attacks
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
-
-
EncryptionYahoo to offer user-friendly e-mail encryption service
Yahoo has announced plans to create its own e-mail encryption plug-in for Yahoo Mail users this year, adding to already growing competition among Silicon Valley firms to capitalize on consumers increased privacy desires. The service will feature “end-to-end” encryption, or the locking up of message contents so that only the user and receiver have access to the information — typically a more advanced and time consuming process which involves specific software and encryption codes.
-
-
CryptographyIncreasing the efficiency of quantum cryptography systems
Researchers have developed a way to transfer 2.05 bits per photon by using “twisted light.” This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light. The new approach doubles the 1 bit per photon that is possible with current systems that rely on light polarization and could help increase the efficiency of quantum cryptography systems.
-
-
EncryptionEncryption for the masses
In the wake of the revelations that intelligence agencies have engaged in mass surveillance, both industry and society at large are looking for practicable encryption solutions which protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user-friendly enough. German scientists have launched an open initiative called Volksverschlüsselung, which aims to bring end-to-end encryption to people.
-
-
EncryptionHackers exploit 1990s-era weak-encryption mandate
Researchers have an old-new computer security vulnerability — the Factoring Attack on RSA-EXPORT Keys (FREAK), which affects SSL/TLS protocols used to encrypt data as it is transmitted over the Internet. The FREAK vulnerability goes back to an early 1990s U.S. restriction which limited software sold abroad to a maximum 512-bit code encryption. The mandate was set to allow U.S. federal intelligence agencies easily to spy on foreign software users.
-
-
Cyber insuranceGrowing demand for cyber insurance, especially by small and mid-size businesses
Technology startup firms are leading the way in ensuring not only the security of their customers, but their own security as well. American businesses are expected to pay $2 billion for cyber insurance premiums in 2014, a 67 percent increase from just one year earlier. More than fifty U.S. insurance carriers are now offering cyber insurance policies. Even more impressively, many of these are focusing on small and mid-size businesses.
-
-
CybersecurityProtecting the security for networks of the future
Today’s company networks comprise hundreds of devices: routers for directing data packets to the right receiver, firewall components for protecting internal networks from the outside world, and network switches. Such networks are extremely inflexible because every component, every router and every switch can carry out only the task it was manufactured for. If the network has to be expanded, the company has to integrate new routers, firewalls or switches and then program them by hand. This is why experts worldwide have been working on flexible networks of the future for the last five years or so, developing what is known as software-defined networking (SDN). It presents one disadvantage, however; it is susceptible to hacker attacks. Researchers have now developed a way to protect these future networks.
-
-
EncryptionThe encryption debate is heating up
The privacy vs. security debate is heating up. Should messages on private devices be encrypted to protect our privacy? Will this dangerously hamper national and international security efforts? If we go the encryption route, are technologies being implemented fast enough to protect sensitive data from criminals?
-
-
China syndromeNew Chinese cyber rules aim to facilitate intellectual property theft: U.S. tech companies
The Chinese government’s cyberspace policy group in late 2014 approved a 22-page document which contained strict procurement rules for technology vendors. Those rules would require U.S. firms selling computer equipment in China to turn over sensitive intellectual property — including source codes — submit their products for “intrusive security testing,” and use Chinese encryption algorithms. U.S. companies selling equipment to Chinese banks will be required to set up research and development centers in China, get permits for workers servicing technology equipment, and build “ports” which allow Chinese officials to manage and monitor data processed by their hardware. U.S. tech companies charge that the new rules would make it easier for China to steal U.S. companies’ intellectual property.
-