Keith Alexander: The Internet is fragile.
Decius: Someone recently told me that they wanted me to look at something in order to understand it, not hack into it. I'm a security vulnerability researcher. I don't understand the difference.
Andy Greenberg: The exploitation of lawful intercept is more than theoretical.
US-China Economic and Security Review Commission: Nearly 15 percent of the world's Internet traffic -- including data from the Pentagon, the office of Defense Secretary Robert Gates and other US government websites -- was briefly redirected through computer networks in China last April. Computer security researchers have noted that the capability could enable severe malicious activities.
James Miller: The cyber threat has outpaced our ability to defend against it.
Dave Winer: Everyone has a scam. This year the scam is to grab all the user's data and resell it.
Matt Warman: Users could sue websites for invading their privacy and would have a right to be "forgotten" online, under new proposals from the European Union.
Julia Angwin: One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
Tony Judt: The question is not going to be, Will there be an activist state? The question is going to be, What kind of an activist state?
Declan McCullagh: A federal judge has ruled that border agents cannot seize a traveler's laptop, keep it locked up for months, and examine it for contraband files without a warrant half a year later.
An unnamed intelligence official: Every day, every week that goes by, there's just one more week of information that we're not collecting. You sit there and say, 'This is unbelievable that we have this gap.'
|