rated online casino south africa best online blackjack usa players united states casino slots new us online casinos all new video slots online blackjack bonus UseMyBank and online casinos instant play casino for us players slot machines games best paying casino games 2014 bonus guide best online slots site casino forum best online casino slots us player blackjack casino real money play casino slot machine online

best casino bonuses australian online casino au dollars trusted online gambling internet casino download old information online us casinos las vegas best online casino craps flash casino games mac play online vegas

Get Our Newsletter



Site Search

Entire (RSS)
Comments (RSS)

Archive Calendar

March 2012
« Feb   Apr »


How to Become a Bounty Hunter

FBI Dir. Robert Mueller Continues to Bang the Drum About the Dangers of Terrorists and the Cyber World

Robert Mueller III / file fbi photo By Allan Lengel

By Allan Lengel
There’s was nothing particularly shocking — or for that matter new — in FBI Director Robert S. Mueller III’s speech Thursday, but it was another reminder of the havoc and mischief we can expect via cyber attacks against business and government in the future.

Terrorism remains the FBI’s top priority,” Mueller told a crowd in San Francisco at the RSA Cyber Security Conference, according to the text of his speech. “But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country.”

Mueller talked about how increasingly “cyber savvy” terrorist have become, citing as example, al Qaeda in the Arabian Peninsula, which has produced a full-color, English-language online magazine.

“They are not only sharing ideas, they are soliciting information and inviting recruits to join al Qaeda. ”

“Al Shabaab—the al Qaeda affiliate in Somalia—has its own Twitter account. Al Shabaab uses it to taunt its enemies—in English—and to encourage terrorist activity, ” he said. “Extremists are not merely making use of the Internet for propaganda and recruitment. They are also using cyber space to conduct operations.”

“The individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance. They used file-sharing sites to share sensitive operational details. They deployed remote conferencing software to communicate. They used a proxy server to avoid being tracked by an IP address. And they claimed responsibility for the attempted attack—on YouTube.”

To read the complete speech click here.



Print This Post Print This Post

Write a comment

You need to login to post comments!