44 online
 
Most Popular Choices
Share on Facebook 24 Printer Friendly Page More Sharing
General News    H3'ed 10/30/09

In time for Halloween, spectre of Internet voting re-emerges

By       (Page 2 of 2 pages) Become a premium member to see this article and all articles as one long page.   No comments
Follow Me on Twitter     Message Roy Lipscomb
Become a Fan
The advent of Internet attacks - especially those suspected of being directed by nations, not hackers - has given rise to a new term inside the Pentagon and the National Security Agency: "hybrid warfare."

Just before Mr. Obama was elected, the Center for Strategic and International Studies, a policy research group in Washington, warned in a report that "America's failure to protect cyberspace is one of the most urgent national security problems facing the new administration."
________________________________________________________________________

Chinese Military Hacked Into Pentagon

http://tinyurl.com/28m572 or
click here
________________________________________________________________________

Spear-Phishing And Pharming: Cybertheft of identity and data is becoming sophisticated business.

http://tinyurl.com/ygp97fr or
click here=technology_newsletter

Excerpts:

This isn't just the work of amateurs anymore. Organized gangs of highly trained software and hardware experts from places like Eastern Europe or Asia are now connected to people of similar or complementary skills in the U.S. and Western Europe. The prizes are valuable secrets ranging from personal identities and passwords to intellectual property at the foundation of global corporations (see "Hackonomics").

"All the stuff we know about is the tip of the iceberg," [Ken Silva, chief security officer at Verisign] says. So-called worms and bots (software robots) are "noisy," making their presence known quickly. "The real problem is where people have developed programs that are relatively quiet and which slowly infiltrate the data in such a way that it can sit there for years and no one knows it."
_______________________________________________________________________

Electronic voting machines in U.S. at risk from foreign hackers attacking military computers

http://tinyurl.com/yzxerzm or
click here

Next Page  1  |  2

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Roy Lipscomb Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Roy Lipscomb, Emeritus Director for Technology, Illinois Ballot Integrity Project

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Don't Vote Early, Don't Vote Absentee, Don't Vote by Touch Screen

Job Creation? Businesses Prefer Root Canal

Pollwatching at Chicago's Central Vote-Tabulating Room

In time for Halloween, spectre of Internet voting re-emerges

Pollwatcher Tools: A Carrot, a Stick, and a Checklist

To View Comments or Join the Conversation:

Tell A Friend