Americas

  • United States

Asia

Oceania

by CSO Contributor

Still Living Dangerously; Guards Overpower Hijacker on Saudi Airlines Plane; FBI Computer Lab Planned; Phone Hacking on the Rise

News
Oct 15, 20022 mins
CSO and CISOData and Information Security

Still Living Dangerously

A smart terrorist understands that he is not engaged in conventional warfare, writes Paul Krugman in an op-ed in todays New York Times. The terrorist kills to call attention to his cause, to radicalize moderates, to disrupt the lives and livelihoods of those who would prefer not to be involved, to provoke his opponents into actions that drive more people into his camp. In case you haven’t noticed, the people running Al Qaeda are smart. And recent events reinforce the sinking feeling that our leaders, who seem determined to have themselves a conventional war, are playing right into the terrorists hands.Guards Overpower Hijacker on Saudi Airlines PlaneReuters report today, guards foiled an attempt by a Saudi gunman Tuesday to hijack a Saudi Arabian Airlines flight from Sudan with 204 passengers and crew on board, Saudi and Sudanese officials said. Apparently no one was injured by the hijacker, who had a pistol. The Sudanese Interior Ministry said in a statement carried by the state-run SUNA news agency that the authorities were interrogating the hijacker.

According to a

FBI Computer Lab PlannedMercury News reports that the lab is expected to be operating by next year. It will be staffed by about 15 highly trained investigators culled from the FBI and local agencies. There are two regional computer labs in operationin San Diego and Dallas.

The FBI is creating a $3 million computer forensics lab in Silicon Valley, using the latest imaging software and high-end computers to sleuth for cyber-clues of child pornography, corruption, murder and more. Todays

Phone Hacking on the RiseGuardian newspaper, journalists hacking into strangers mobile phone voicemail boxes is an increasingly frequent technique used to beat rivals to scoops. It is a relatively simple process but can only be used if the mobile phone user has not changed the default access code. This started as a dirty tricks ploy by the [tabloid] papers but voicemail espionage has become epidemic, said James Herring of Taylor Herring Communications, which represents celebrities.

According to the UKs