Monday 12th of September 2011

#crimeware

The proof-of-concept even has a name that will bring back memories of a science fiction computer that aims to control the world: SkyNET. For the botmaster, the advantage is obvious: the controlling computer is mobile, and thus much more difficult to track down.

Read!

Sunday 9th of October 2011

#crimeware

Predator Drone Virus Could Be Internal Monitoring System: Analyst:

Read!

Tuesday 11th of October 2011

#crimeware

Homeland Security moves forward with 'pre-crime' detection | Privacy - CNET News via @cnet

Read!

Wednesday 19th of October 2011

Watch video

#crimeware

Check this video out -- One Mainframe To Rule Them All (1of5)

Read!

Monday 2nd of January 2012

#crimeware

cory @doctorow: The coming war on general computation «a world of ubiquitous malware» 

Read!

Monday 7th of May 2012

#crimeware

Preparing for World Web War I

Read!

Monday 7th of May 2012

#crimeware

Web War II: What a future cyberwar will look like

Read!

Wednesday 20th of June 2012

#crimeware

Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say

Read!

Friday 6th of July 2012

#crimeware

Pentagon Digs In on Cyberwar Front

Read!

Friday 6th of July 2012

#crimeware

Skynet is real: 'Internet doomsday' a ticking time bomb

Read!

Wednesday 25th of July 2012

#crimeware

Mitt Romney – Are all twitter followers equal?

Read!

Wednesday 13th of March 2013

#crimeware

Surveillance software used to spy on activists around the world

Read!

Wednesday 13th of March 2013

#crimeware

RSF : The Enemies of Internet - Era of the digital mercenaries

Read!

Wednesday 13th of March 2013

#crimeware

Martin J. Muench -- is the developer of Andover, U.K.-based Gamma Group’s FinFisher intrusion software, which he sells to police and spy agencies around the world for monitoring computers and smartphones to intercept Skype calls, peer through Web cameras and record keystrokes.

Read!

Saturday 8th of June 2013

#crimeware

We know that the NSA has many domestic-surveillance and data-mining programs with codenames like Trailblazer, Stellar Wind, and Ragtime -- deliberately using different codenames for similar programs to stymie oversight and conceal what's really going on. We know that the NSA is building an enormous computer facility in Utah to store all this data, as well as faster computer networks to process it all. We know the U.S. Cyber Command employs 4,000 people.

Read!

Wednesday 12th of June 2013

#crimeware

Connected to the Google Connected to the government

Read!

Sunday 3rd of November 2013

#crimeware

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Read!

Tuesday 3rd of December 2013

#crimeware

Vers une surveillance généralisée d'Internet en France ?

Read!

Tuesday 31st of December 2013

#crimeware

Inside TAO: Documents Reveal Top NSA Hacking Unit

Read!

Wednesday 1st of January 2014

#crimeware

Interactive Graphic: The NSA's Spy Catalog

Read!

Friday 4th of April 2014

#crimeware

Coalition Against Unlawful Surveillance Exports

Read!

Wednesday 16th of April 2014

#crimeware

Google Warns: We Are Scanning Your Email

Read!

Monday 10th of November 2014

#crimeware

“Today we have demonstrated that, together, we are able to efficiently remove vital criminal infrastructures that are supporting serious organised crime. And we are not 'just' removing these services from the open Internet; this time we have also hit services on the Darknet using Tor where, for a long time, criminals have considered themselves beyond reach. We can now show that they are neither invisible nor untouchable. The criminals can run but they can’t hide. And our work continues....”, says Troels Oerting, Head of EC3.

Read!

Monday 10th of November 2014

#crimeware

Global law enforcement conducted a massive raid of the Dark Web this week. It started with the FBI takedown of Silk Road 2.0 and the arrest of its alleged operator Blake Benthall in San Francisco on Wednesday.

Read!

Thursday 18th of December 2014

#crimeware

Note: This article is being updated almost daily with new developments regarding the leaks from the Sony Pictures breach.

Read!

Thursday 18th of December 2014

#crimeware

It could only happen in the movies. A major Hollywood company produces a film starring well-known comedic actors which involves the tongue-in-cheek assassination of the leader of a remote and rather bizarre dictatorship. The “supreme leader” apparently orders a secret group of cyber warriors calling themselves “The Guardians of Peace” (in actuality, the State-run “Bureau 121”) to retaliate by attacking the company’s IT system.

Read!

Saturday 24th of January 2015

#crimeware

When Thinking Machines Break the Law …

Read!

Tuesday 17th of March 2015

#crimeware

In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.

Read!

2011

2012

2013

2014

2015

artificial intelligence California cia Defense Advanced Research Projects Agency disnovation drones Google killerrobots nsa pr robot robots San Francisco skynet storytelling terminator terrorism The Electronic disturbance war Wikileaks