Until it was busted this week, an Internet drug ring doing business in 34 countries, all 50 states and the District of Columbia, eluded law enforcement by using TOR, an encrypted computer network developed for--and used by--the federal government.
The U.S. Attorney's Office for the Central District of California in Los Angeles says eight of the ring's kingpins—six from the U.S. and one each from Argentina and the Netherlands—have now been arrested. All face federal drug trafficking and money laundering charges.
The exploding use of information systems and networks has led to an increasingly interconnected world.
Computer networks now support critical infrastructures such as energy, transportation, and banking and finance, and play a major part in how companies do business, how governments provide services to citizens and enterprises, and how people communicate and exchange information.
The number and nature of technologies has multiplied and will continue to grow, as has the nature, volume, and sensitivity of information that is moving from place to place.
People who post their opinion on Twitter or Facebook do not always expect serious consequences as a result. However, photographs, videos and messages posted on social media are increasingly grounds for dismissal, lawsuits or even prison sentences.
Dutch lawyers report an increase in legal disputes following ill-advised use of social media.
Companies monetizing user data, bad laws and the cyber-arms race are significant risks to information security, British Telecom CTO Bruce Schneier told attendees at the RSA Conference.
The three biggest information security risks in 2012 are the rise of big data, ill-conceived regulations and the prospect of cyber-war, a prominent security expert told attendees at the 2012 RSA Conference.
Last month it became apparent that not all VPN providers live up to their marketing after an alleged member of Lulzsec was tracked down after using a supposedly anonymous service from HideMyAss. We wanted to know which VPN providers take privacy extremely seriously so we asked many of the leading providers two very straightforward questions. Their responses will be of interest to anyone concerned with anonymity issues.