online slots real money usa best us casino bonuses codes top online casinos for usa players top 10 casinos slot machines games best paying casino games 2014 bonus guide best online slots site casino forum best online casino slots us player blackjack casino real money play casino slot machine online


Get Our Newsletter


Twitter Widgets



Links

Columnists





Site Search


Entire (RSS)
Comments (RSS)

Archive Calendar

March 2012
S M T W T F S
« Feb   Apr »
 123
45678910
11121314151617
18192021222324
25262728293031

Guides

How to Become a Bounty Hunter



FBI Dir. Robert Mueller Continues to Bang the Drum About the Dangers of Terrorists and the Cyber World

Robert Mueller III / file fbi photo By Allan Lengel

By Allan Lengel
ticklethewire.com
There’s was nothing particularly shocking — or for that matter new — in FBI Director Robert S. Mueller III’s speech Thursday, but it was another reminder of the havoc and mischief we can expect via cyber attacks against business and government in the future.

Terrorism remains the FBI’s top priority,” Mueller told a crowd in San Francisco at the RSA Cyber Security Conference, according to the text of his speech. “But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country.”

Mueller talked about how increasingly “cyber savvy” terrorist have become, citing as example, al Qaeda in the Arabian Peninsula, which has produced a full-color, English-language online magazine.

“They are not only sharing ideas, they are soliciting information and inviting recruits to join al Qaeda. ”

“Al Shabaab—the al Qaeda affiliate in Somalia—has its own Twitter account. Al Shabaab uses it to taunt its enemies—in English—and to encourage terrorist activity, ” he said. “Extremists are not merely making use of the Internet for propaganda and recruitment. They are also using cyber space to conduct operations.”

“The individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance. They used file-sharing sites to share sensitive operational details. They deployed remote conferencing software to communicate. They used a proxy server to avoid being tracked by an IP address. And they claimed responsibility for the attempted attack—on YouTube.”

To read the complete speech click here.

OTHER STORIES OF INTEREST

 


Print This Post Print This Post

Write a comment

You need to login to post comments!