By
Debra KaufmanFebruary 24, 2016
Although smartphones are becoming commodities, the mobile industry operators, developers, and Internet companies attending the 2016 Mobile World Congress aren’t worried. That’s because the focus is on the Internet, especially the upcoming 5G networks, which power not just mobile phones but all connected devices. The show is a hotspot for the new gadgets, licensing and partnership deals, frenzied competition and new entrants driving the industry to create services and devices that work seamlessly together. Continue reading Mobile World Congress Focuses on 5G, IoT, VR and Regulation
By
Debra KaufmanFebruary 24, 2016
European telecoms and Silicon Valley giants are jousting again, at the annual Mobile World Congress in Barcelona. The major carriers, including Deutsche Telekom AG and Spain’s Telefónica SA are pushing for the European Union to either lift some of the regulations imposed on them or apply similar rules to Internet-based text and voice services, such as Facebook’s WhatsApp or Google Hangouts. At the same time, several telecoms have signed on to Facebook’s TIP project, an open source initiative to design cellular towers. Continue reading Telecoms and Silicon Valley Engage at Mobile World Congress
By
Debra KaufmanFebruary 22, 2016
The battle between terrorism and privacy has been brewing for quite some time, and the tipping point was the iPhone belonging to Syed Rizwan Farook, who, with his wife, opened fire at an office party in December 2015, killing 14 people and injuring 22. The FBI has been trying to decrypt Farook’s phone, unsuccessfully, and asked Apple to create a “backdoor” code into the phone. Apple refused, and now a court order gives the Silicon Valley company five days to comply. Chief executive Tim Cook is holding firm. Continue reading Apple and U.S. Government Battle Over Privacy vs. Terrorism
By
Debra KaufmanDecember 22, 2015
Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation
By
Debra KaufmanNovember 17, 2015
In response to Edward Snowden’s revelations of government surveillance of ordinary citizens, many Internet and social media companies responded by creating encryption so advanced that even they couldn’t read users’ communications. Now, many critics say, terrorists and other criminals are using those same platforms because their messages will be safely encrypted from prying eyes of intelligence and government authorities. Among the strongest critic is the U.K. government, which is proposing that such encryption be illegal. Continue reading U.K. Plans to Ban Advanced Encryption to Combat Terrorists
By
Rob ScottOctober 12, 2015
California Governor Jerry Brown last week signed a new law designed to protect digital privacy rights. The California Electronic Communications Privacy Act (CalECPA) mandates that a warrant is required in order for state law enforcement agencies or investigators to compel businesses to turn over metadata or digital communications such as emails, texts, and cloud-stored documents. Additionally, it requires a warrant for the tracking or searching of electronic devices. The White House, meanwhile, has backed down on its battle with tech companies over encrypted data of digital devices. Continue reading CalECPA: California Governor Signs Landmark Privacy Law
By
Debra KaufmanAugust 10, 2015
The emergence of Stagefright, a malicious code that targets Android phones, has impacted all mobile companies using the Google operating system. Google has already fixed the problem in its own line of Nexus phones and tablets, and now plans to supply monthly security updates wirelessly. Both Samsung and LG have also announced they will be issuing a monthly security update; other impacted mobile phone manufacturers include Sony, HTC and Android One, all of which have provided or plan to provide Stagefright patches. Continue reading Mobile Companies Face Stagefright, Android Security Issues
Tech companies including Apple, Facebook, Google and Microsoft joined Internet security experts and civil liberties organizations this week to draft a letter to President Obama warning that a “backdoor” for U.S. law enforcement could also serve as a backdoor for hackers and other governments. The Obama administration has been considering whether companies should only be allowed to use encryption that provides law enforcement with unscrambled access (or a “backdoor”). Critics are concerned about weakening encryption tech that protects Internet communications. Continue reading Tech Industry Urges President to Not Weaken Encryption Tech
By
Meghan CoyleFebruary 12, 2015
The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats
By
Meghan CoyleOctober 9, 2014
Social network Twitter filed a lawsuit against the U.S. government on Tuesday, seeking to bring more transparency to government surveillance. Twitter wants the government to ease restrictions on what tech companies can publicly disclose about the government’s national security-related requests for user data. The company alleges that these restrictions violate the company’s First Amendment rights. This is the latest in a series of battles over online national surveillance. Continue reading Twitter Sues U.S. Government Over Surveillance Disclosures
By
Marlena HallerJune 3, 2014
According to top-secret 2011 documents released by Edward Snowden, the NSA is collecting online images of people for its facial recognition programs. As estimated in the documents, the agency intercepts about 55,000 images that have facial-recognition quality. Civil liberties advocates are concerned that these technologies could result in an invasion of privacy. However, neither privacy nor surveillance laws protect against the government’s use of facial images. Continue reading NSA Turns to Web Images for Facial Recognition Programs
By
Rob ScottMarch 17, 2014
Apple’s Touch ID fingerprint reader, released with the iPhone 5s, includes a sensor the thickness of a human hair, a sapphire crystal button, capacitive tech and complex data analysis. Alabama-based startup IDair believes it can replicate the quality of the Touch ID with a simpler approach that uses existing smartphone cameras to capture images of users’ fingers. IDair’s tech uses an algorithm the company has patented to convert the image into a means of identification. Continue reading Startup Develops Secure Method to Access Data on Your Phone
By
Lisette LeonardJanuary 31, 2014
In a mission to make government agencies more understandable to children, and the general public, the National Security Agency has created a website filled with interactive games, cartoon characters and puzzles. The goal is to educate children about spying, and spark an early interest in related career paths. The CryptoKids website for “future codemakers and codebreakers” is aimed to make these occupations seem cool, and even has a section entitled “How Can I Work for NSA?” Continue reading NSA Creates Website and Games to Educate Young Children
By
Cassie PatonDecember 12, 2013
The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists
By
Rob ScottSeptember 2, 2013
Last week, the MPAA rejected findings of a European study that suggests the shutdown of piracy site Megaupload damaged revenues for theatrical films other than blockbusters. Megaupload was shut down by the FBI in January 2012. While researchers at Carnegie Mellon found that the shutdown boosted legitimate digital sales of movies, a new study from Ludwig Maximilians University Munich and Copenhagen Business School argues that anti-piracy measures may have unintended consequences for different kinds of movies. Continue reading Megaupload Shutdown: MPAA Rejects Findings of Piracy Study