Kevin Poulsen
"'While this information is critical to identify and mitigate vulnerabilities in the system, it can equally be employed by hostile actors to identify vulnerabilities for the purpose of exploiting them,' the DHS argued in an FCC filing this month. 'Depending on the disruption in question, the errant disclosure to an adversary of this information concerning even a single event may present a grave risk to the infrastructure.'" [more]
"FBI agents arrested a Louisiana man last week under the cyberterrorism provisions of the USA PATRIOT Act for allegedly tricking a handful of MSN TV users into running a malicious e-mail attachment that reprogrammed their set-top boxes to dial 9-1-1 emergency response." [more]
"A key provision of the law bars the government from using the vulnerability information in any enforcement action against the company, or from using it as the basis for proposing new legislation or regulations on industry. And if the information does somehow leak out, it cannot be used in court against the company." [more]
"A controversial directive passed by the European Parliament last month allows the 15 European Union member countries to force ISPs to collect and keep detailed logs of each customer's traffic, so that law enforcement agencies could access it later." [more]
1–4 of 4 records found matching your criteria.
|
(Reuters, Dec 18)
"Federal prison officers in Brooklyn physically and verbally abused immigrants detained after the Sept. 11 attacks, slamming them against the wall and painfully twisting their arms and hands, the U.S. Justice Department's inspector general said on Thursday." [more]
(STAFF, DEBKAfile, Dec 14)
"Saddam was seized, possibly with the connivance of his own men, and held in that hole in Adwar for three weeks or more, which would have accounted for his appearance and condition. Meanwhile, his captors bargained for the $25m prize the Americans promised for information leading to his capture alive or dead." [more]
|