Technology Archives February 2013

Archives January 2013 →

U.S. Supreme Court backs Government Spying of Citizens

A sharply-divided Supreme Court on Tuesday threw out an attempt by U.S. citizens to challenge the expansion of a surveillance law used to monitor conversations of foreign spies and terrorist suspects.

Scientists say new device cleans virus, bacteria and other pathogens from the air

A team of U.S. researchers has created a device that uses X-rays to clean the air of viruses, bacteria and other particles that are toxic or hazardous to human health.

Is the U.S. stepping up Internet control push over unproven hacking allegations?

The Obama administration is utilizing unsubstantiated charges of Chinese government cyber-attacks to escalate its threats against China.

Apple’s ‘ecosystem’ control grid is about to get more control

Apple is evolving into an ecosystem, a network that connects to and controls everything from your home to your car to your office. This has the potential to be as impactful as the iPhone and iPad. Today I use iOS apps to control my stereo system (the Sonos) and central air (the Nest). Both work beautifully, and there are more iThings on the way like this incredible door lock.

U.S. says it’s ready to strike back at Chinese cyber attackers

As The Real Agenda informed yesterday, a new report issued by internet security company Mandiant has concluded that some of the most visible cyber attacks on U.S. based companies and government entities are coming from China.

Mandiant Internet Security accuses Chinese Army unit of cyber attacks on U.S.

A secret unit of the People’s Liberation Army (PLA) of China is behind a number of attacks suffered by businesses and organizations in the United States, according to a report released by the U.S. company Mandiant Internet security.

Obama confirmed Internet power grab during State of the Union address

President Barack Obama announced during his State of the Union that he has signed an executive order to ensure national security against possible cyber attacks.

Raytheon + Social Networks = Data Mining Riot

“Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search.”

Obama to extend his powers to launch ‘preemptive’ cyber attacks

The latest power grab enables the President of the United States to launch pre-emptive attacks on anyone suspicious of planning to attack U.S. infrastructure.

U.S. Homeland Security Department approves ‘Suspicionless’ Seizure of Electronics

The Department of Homeland Security’s civil rights watchdog has concluded that travelers along the nation’s borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security.

Genetically Modified Vaccines with reprogrammed insect virus are here!

A new vaccine for influenza has hit the market, and it is the first ever to contain genetically-modified (GM) proteins derived from insect cells. According to reports, the U.S. Food and Drug Administration (FDA) recently approved the vaccine, known as Flublok, which contains recombinant DNA technology and an insect virus known as baculovirus that is purported to help facilitate the more rapid production of vaccines.

Genetically Modified Organisms: Not Even in Moderation

If I told you that there was a poison, let’s say, strychnine, for example, that you could ingest in teeny tiny minuscule doses and live to tell the tale, would you do it?

France orders Twitter to identify racist users

A French court ruled Thursday that Twitter must help identify the authors of racist tweets posted on its site. The ruling follows a complaint brought by an activist group in October that argued such tweets breach laws against inciting racial hatred.

Archives January 2013 →

We encourage readers to keep their comments civil and to use their freedom of speech to help the debate by providing their take on the issues or challenging anything they do not agree with by presenting alternative views and information.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s