On Monday, the head of the National Security Agency (NSA) urged Congress to act swiftly to establish workable guidelines and jurisdictional boundaries in the war against destructive computer attacks that might be made against the online infrastructure of the United States.
General Keith Alexander of the U.S. Army delivered an address at the American Enterprise Institute arguing that the need for such congressional action is urgent, and that something has to be done before the nation is hit with a disabling cyberattack. He insisted that the likelihood of such an assault was increasing.
Telecommunications giant Verizon filed a brief that the FCC is overreaching, again, in its quest to regulate the Internet
Cellphone carriers report an increase in the number of law enforcement requests for user information. The Air Force is training drone pilots by having them follow civilian cars.
With Ron Paul’s bill H.R. 459, the Federal Reserve Transparency Act, headed for a floor vote in the House in the next two weeks (and likely success at passage with 263 sponsors), he and his son Sen. Rand Paul (R-Ky.) are now focusing on the Internet.
His Campaign for Liberty (C4L), started in 2008 with some four million dollars of campaign funds from his unsuccessful run for the White House that year, has issued its manifesto to continue the fight: “The Technology Revolution: A Campaign for Liberty Manifesto.”
On July 2, social media service Twitter released its first ever “Transparency Report” revealing the alarming number of requests it has received from the government of the United States to delete tweets and disclose information about its users.
The attorney for accused document leaker former U.S. Army Private Bradley Manning won a pretrial motion for full discovery of exculpatory evidence in military court June 25, according to various news sources.
As the sprawling surveillance site being constructed by the National Security Agency (NSA) in Utah grows larger and nearer completion every day, the domestic spy service remains tightlipped about just how much and what kind of personal electronic data they have already collected and collated. Not only does the NSA refuse to provide such information, it insists that it cannot be forced to.
In July of 2011 and again in May 2012, Senators Mark Udall (D-Colo.) and Ron Wyden (D-Ore.) wrote a letter to James R. Clapper, Jr., the Director of National Intelligence, asking him a series of four questions regarding the activities of the NSA and other intelligence agencies regarding domestic surveillance.
Reports indicate that the Department of Defense is creating autonomous cyber weapons, which are being used against foreign entities, such as Iran, but will also in all likelihood be used against Americans.
The British government is proposing a bill that would force communications providers to log details of every e-mail, telephone call, and text message in the U.K. and make this information available to law enforcement on request.
In efforts to intimidate and suppress the speech of prominent conservative bloggers, opponents are implementing a decade-old technique called “SWAT-ing,” which involves prank callers phoning law-enforcement authorities and reporting a violent crime at someone’s home. The pranksters generally camouflage their actual phone numbers — by making them appear to originate from the victim’s home — leading SWAT teams to be dispatched to a person’s residence.