Law enforcement agencies in California are using devices that mimic cellular base stations to track mobile users, public records have revealed, triggering charges that the practice may be unconstitutional.
The U.S. last week brought charges against two Arkansas men for operating an e-mail hacking website, needapassword.com, which offered to obtain passwords to any e-mail account for a fee. The scheme, operated by Mark Anthony Townsend of Cedarville, Ark., and Joshua Alan Tabor of Prairie Grove, affected some 6,000 accounts, according to a Jan. 24 press release from the Federal Bureau of Investigations. Cedarville and Prairie Grove have a combined population of less than 6,000 people. Yet the investigation into the website stretched around the globe.
A deal between the United Arab Emirates (UAE) deal to buy two intelligence satellites from France worth $930 million is in trouble after the US NSA tried to put backdoors into the technology.
Two high-resolution Pleiades-type Falcon Eye military observation satellites contained two specific US-supplied components that provide a back door to the highly secure data transmitted to the ground station.
A United Arab Emirates (UAE) deal to purchase two intelligence satellites from France worth almost 3.4 billion dirhams (US $930 million) is in jeopardy after the discovery of what was described as “security compromising components.”
A high-level UAE source said the two high-resolution Pleiades-type Falcon Eye military observation satellites contained two specific US-supplied components that provide a back door to the highly secure data transmitted to the ground station.
Microsoft believes that the government, but not necessarily the National Security Agency (NSA), may stymie the IT industry’s efforts to safeguard corporate and user data.
Top security executives at the company have put together their top predictions for 2014 for the Microsoft Security Blog. Paul Nicholas, senior director of Global Security Strategy for Microsoft’s Trustworthy Computing division says that government efforts to bolster cyber-security may end up doing more harm than good if all stakeholders fail to see eye-to-eye.