EPIC FOIA: EPIC Obtains Secure Flight Documents

In response to EPIC’s Freedom of Information Act request, the Transportation Security Administration has released records about Secure Flight, a program that compares airline passenger records with various watch lists. The documents provided to EPIC contain an interagency agreement between the TSA and Customs and…

National Archives Confirms Existence of Numerous Kavanaugh Records on Surveillance Programs

In response to EPIC’s Freedom of Information Act suit, the National Archives has now confirmed that there are hundreds of records concerning Brett Kavanaugh’s role in controversial White House surveillance programs, including warrantless wiretapping and the Patriot Act. The programs were later suspended, curtailed, or…

What’s in a Name? Cisco Visibility Is Now Cisco Threat Response

Cisco Visibility is now Cisco Threat Response: a key part of our integrated security portfolio, designed to give you even more value from what you’ve already gotten from us. VISIT THE SOURCE ARTICLE What’s in a Name? Cisco Visibility Is Now Cisco Threat Response

EPIC FOIA: EPIC Obtains Facebook Privacy Documents

In response to an EPIC Freedom of Information Act lawsuit, the Federal Trade Commission has released supplemental materials from the biennial Facebook audits (production 1, production 2, production 3, production 4). The audits were required by the FTC’s 2011 Consent Order with Facebook. The documents…

GoFind Announces Crowdfunding Campaign for Development of the First Artificial Intelligence implementation of a Personal Emergency Response System

… Response device (PERS) that incorporates Artificial Intelligence (AI) to expand the capabilities … . NudgeR is the first APERS (Artificial Intelligence Personal Emergency Response System) and … VISIT THE SOURCE ARTICLE GoFind Announces Crowdfunding Campaign for Development of the First Artificial Intelligence implementation of…

Neocons Concoct Threat of “Iranian Hackers” to Justify Preemptive “Counterattack” Against Iran

… preemptive “counterattack” in response. Quoting anonymous U.S. government officials, think … “threat” posed by Iranian state-sponsored hackers, state that they originated with … , a senior adviser to the group United Against Nuclear Iran (UANI … VISIT THE SOURCE ARTICLE Neocons Concoct Threat of…

Documents Bare How Federal Researchers Went to Absurd Lengths to Undo Problematic Tattoo Recognition Research

Well, this is a first. In response to an EFF investigation that uncovered deeply troubling research practices by the National Institute for Technology & Standards (NIST), a senior federal scientist stripped off his clothes, had another scientist draw all over his skin with washable markers,…

Cyber attacks are inevitable: it’s how you respond that counts

… and effective response to a cyber attack is impossible without thorough planning … a cyber attack. The onus is on organizations to report any cyber attack to … have responded inadequately to a cyber attack, particularly one that involves compromised … VISIT THE SOURCE…

Aussie businesses would spend $166K to remediate a cyber attack

Australian organisations would spend an average of just under $166,000 in response to a major cyber event, coming in “significantly lower” than the global average of nearly $290,000. According to findings by Malwarebytes, threats are taken seriously by … VISIT THE SOURCE ARTICLE Aussie businesses…