Christmas comes early as white hats totally pwn script-kiddie newbs
Since August, a hacker group calling itself the Lizard Squad -- self-described as a handful of 'guys with too much free time on their hands' -- have been entertaining themselves by spoiling other people's fun. Primarily, they've been doing this by attacking online video game services and knocking them offline. An opposing "white hat" group of network security researchers have now exposed members of the Lizard Squad group, leading to the arrest of three members, some of whom had also been involved in bomb threats and other domestic terrorism.
CTTSO solicits vendors for program to aid military understanding of technologies
A division of the Department of Defense is investigating cryptocurrency, including Bitcoin, for possible links to crime and terrorism activities, according to an article from the International Business Times. The Combating Terrorism Technical Support Office, a department responsible for developing and investigating counterterrorism abilities, created solicitation number N41756-14-Q-3272 in order attract vendors to aid military branches in understanding the developing technology.
Temporarily closure marks tragedy at Boston marathon
Apple has temporarily closed its Boylston Street location in reaction to the bombing that occurred during Monday's Boston Marathon. The store's page on Apple's web site has a short message that reads: "Our thoughts are with our neighbors in the community and everyone affected by Monday's tragedy in Boston." There is no word yet on how long the story will remain closed, but it was located just a block away on the same street from where the second blast occurred in what police have described as a deliberate act of terrorism that killed three and injured 140 people.
Feds free to seize laptops
As of July 16, US federal agents have the power to seize travelers' laptops and other electronic devices at the border and hold them for however long they want, says a Friday report. The seizures do not require a suspicion of wrongdoing, and are aimed to counter terrorism, with the new policies passed by two Department of Homeland Security agencies. The contents of the confiscated laptops and electronics can then be shared with not only other agencies, but private entities in order to decrypt the data they contain.