June 7, 2013 |
SAN JOSE - President Obama plans to take up the subject of cyber security with Chinese President Xi Jinping on Friday as the two meet behind closed doors for what U.S. officials hope will be a rapport-building session between the two leaders. But the meeting unfolds in an atmosphere of newly heightened concern about the Obama administration's own policies toward the privacy of American citizens, likely to distract the public attention's from the high-stakes meeting in Southern California.
June 6, 2013 |
In January 2010, when Google accused Chinese hackers of infiltrating its network to track emails of human rights activists, the Obama administration didn't disclose what U.S. diplomats in Beijing believed: China's Politburo had directed the attack. Today the White House no longer shies from publicly accusing Beijing of launching a sophisticated range of cyber attacks on U.S. computer networks to steal corporate and government secrets -- including those of naval propulsion systems and gas pipeline technology -- worth billions of dollars.
April 24, 2012 |
WASHINGTON -- Activists and lawmakers are geared up for a final push against the latest Internet security legislation, calling on Congress to reject or dial back the Cyber Intelligence Sharing and Protection Act (PDF) because of the considerable power it would give government to examine Americans' online activities. A number of amendments already have been made to the bill as its supporters have tried to secure passage - - a vote is likely on Friday - - by clearing up ambiguities regarding what the law would allow the government to do. CISPA's supporters portray it as a bill focused on opening up communication between the government and private entities for the purposes of sharing information about imminent or emerging cyber security threats, with particular emphasis on those that threaten national security from foreign sources.
February 23, 2012 |
This post has been corrected. See the note at the bottom for details. Just as U.S. companies are coming to grips with the threats to their computer networks emanating from cyber spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones. Dmitri Alperovitch, the former McAfee cyber security researcher who is best known for identifying a widespread China-based cyber espionage operation he dubbed " Shady Rat ," has used a previously unknown hole in smartphone browsers to deliver an existing piece of China-based malware that can commandeer the device, record its calls, pinpoint its location and access user texts and emails.
November 17, 2002 |
The boys who might save your life one day really love fast cars. one of them, a 24-year-old named Mark Davis, drives a turbo-powered black Ford Mustang. Earlier this year, Mark took me for a drive through Tulsa, Okla., where he lives. "Check this out," he said, as we passed a strip mall. He flipped on a Metallica CD, rolled down the windows, pumped up the volume as high as it could go, and revved his engine. A few people standing on the curb staggered back as if they'd been shot. Mark grinned.
February 12, 2013 |
WASHINGTON - President Obama issued an executive order Tuesday that seeks to shore up the nation's cyber-defenses by improving how classified information is shared between the government and the owners and operators of crucial infrastructure, including electric utilities, dams and mass transit. The long-expected order, which Obama announced in his State of the Union speech, is a stopgap measure that follows Congress' failure last year to pass legislation to create comprehensive standards for the private sector to help thwart digital attacks.
July 11, 2013 |
WASHINGTON - The U.S. reached agreement with China to cooperate on improving investments and climate change, among other areas, but officials could cite little concrete progress on a White House priority: getting the Chinese to stop cyber-theft of American technologies and trade secrets. As China and the U.S. concluded their fifth annual Strategic and Economic Dialogue on Thursday, officials on both sides described the overall tenor of the two-day discussions as candid and constructive.
April 28, 2012
A Times editorial on Wednesday called on Congress to shore up Social Security quickly, as its looming insolvency would only get more difficult to address as time dragged on. But Business columnist Michael Hiltzik, in a piece that ran the same day , wrote that Social Security benefits should be expanded. Hiltzik pointed out that the Social Security Trust Fund ran a large surplus last year. Noting the difference in outlook between the two articles, reader Bob Murtha of Santa Maria wrote: "Times editorial board members and Hiltzik need to get together to compare notes.
October 14, 2009 |
Homeland Security Secretary Janet Napolitano got a firsthand look Tuesday at how her agency, which defends the nation's physical borders, also guards a volatile virtual frontier: cyberspace. Napolitano visited the Cyber Crimes Center, which is operated by U.S. Immigration and Customs Enforcement in a discreet office building in suburban Virginia. Known as C3, the 12-year-old unit has a staff of 35 who use their computer expertise to assist investigations of complex international crimes, especially those that victimize children.
July 16, 2010 |
Since taking the helm of Northrop Grumman Corp. in January, Wesley G. Bush hasn't wasted any time shaking up one of the world's largest military contractors. On his first day on the job, Bush made a stunning announcement that he was moving Northrop's headquarters out of Los Angeles — where the company has been since it was founded in 1939 — to the Washington area. He then pulled Northrop out of the Pentagon's $35-billion aerial refueling tanker competition, shuffled top executives and this week announced he was looking at abandoning the company's $6-billion-a-year shipbuilding business.