DARPA’s Newest Tech Projects that Could Change the World

The Defense Advanced Research Projects Agency (DARPA), responsible for bankrolling the early Internet, is busy developing new technologies that could have a similar impact on the world. The agency’s $3 billion budget is funding research on atomic GPS technology that does not require a satellite to achieve geo-location awareness, terahertz frequency electronics that could lead to significant health-related applications, a virus shield for the Internet of Things, and Rapid Threat Assessment to aid drug discovery. Continue reading DARPA’s Newest Tech Projects that Could Change the World

NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

15 Percent of American Adults Not Using the Internet or Email

A new report from the Pew Internet & American Life Project, based on interviews conducted by Princeton Survey Research Associates, indicates that 15 percent of American adults ages 18 and older say they are not using the Internet or email. Survey participants cite issues related to relevance, problems with ease-of-use, security, expense and availability as primary reasons. Additionally, another 9 percent of U.S. adults note that they use the Internet, but not while they are at home. Continue reading 15 Percent of American Adults Not Using the Internet or Email

UTA Draws Developers for Third Annual Hollywood Hack Day

The third annual Hollywood Hack Day took place last weekend, bringing a hackathon — a timed collaborative event during which software developers create new apps or Web services — to Los Angeles. United Talent Agency hosted the event and provided increased bandwidth for the 135 developers and designers involved in the 2-day competition. Because the event was in LA, several teams chose to create apps about the art and business of entertainment. Continue reading UTA Draws Developers for Third Annual Hollywood Hack Day

Ethical Hacking: Going Undercover to Train Employees

Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees

China Campaigns Against Western Media and Tech Firms

As the result of a two-pronged campaign coming out of China against Western media and the technology companies that create devices from which the Chinese access news and entertainment, it may become increasingly difficult for outside companies to operate within the country. As part of the ongoing campaign, Chinese state-fun broadcaster CCTV aired a critical documentary last week regarding Apple’s customer service. Continue reading China Campaigns Against Western Media and Tech Firms

Surveillance Catalog: Government Uses New Monitoring Techniques

  • Take a look at the toolkit for governments to legally monitor what people are doing on the Web. It’s an impressive catalog that includes hacking, intercept, data analysis, Web scraping and anonymity products. It makes one aware that nothing is safe from surveillance.
  • Hacking tools use techniques commonly used in malware.
  • Intercept tools can filter all traffic from the Internet backbone and determine which to forward to law enforcement.
  • Data analysis sorts, stores and analyzes information from a variety of sources including wired and wireless networks, surveillance, domestic and foreign agencies, tactical operations, etc. to build a complete profile of suspects or identify patterns across data sets.
  • Web scraping gathers and analyzes data from publicly available sources.
  • Anonymity hides the identity of investigators.
  • If governments are already using these tools, how long will it be before anyone can obtain them? WIll this imperil the confidence people have online?