USA

Obama: “we’re building Iron Man” (and here’s how)

Obama: “we’re building Iron Man” (and here’s how)

If you’ll remember back in October of 2013 there was a story about how a "real Iron Man" was being built by the US Army. This week, US President Barack Obama spoke up on the White House’s next initiative for manufacturing innovation in the United States. In this speech, he suggested that the reason the press was gathered was that the United States government was building Iron Man - it was a joke, of course.

Continue Reading...

Privacy watchdog finds NSA program ineffective and illegal

Privacy watchdog finds NSA program ineffective and illegal

Just a few days after Obama's awaited, and disappointing to some, speech about the NSA's program, an independent federal body came out with its own rather scathing analysis of the divisive program. According to the Privacy and Civil Liberties Oversight Board, the NSA's phone record collection spree in the name of counter-terrorism is not only ineffective but also illegal and needs to be shutdown.

Continue Reading...

Huawei CEO to French media: “We have decided to exit the US market”

Huawei CEO to French media: “We have decided to exit the US market”

Huawei CEO Ren Zhengfei has some words for the US government and US tech companies. In light of a push in recent years by some officials and tech execs to shun Huawei and ZTE based on their alleged collusion with the Chinese government to spy on the US, Zhengfei said Huawei is "exiting the US market." However, the statement should be seen as a stern statement of things to come rather than an immediate game plan if international suspicions don't cool off.

Continue Reading...

U.S. to implement strategy against China trade secret theft

U.S. to implement strategy against China trade secret theft

There have been an onslaught of trade secret thefts and espionage strikes that have affected many U.S. corporations, including General Motors, Ford, DuPont, Dow Chemical and Cargill, as well as many media news outlet including The Washington Post, The New York Times, The Wall Street Journal, and Bloomberg news. All of the attacks seem to be originating from one area in China, and that’s the HQ for the People’s Liberation Army Unit 61398.

Continue Reading...

French internet tax proposed for American companies

French internet tax proposed for American companies

This week the French government has released a report that proposes an internet tax to make up for the supposed lost revenue the web is making a reality with online businesses such as Amazon and social networks like Facebook. The proposed tax would not be on products sold, but on the collection of personal data, which they feel is something they're entitled to earn with. President François Hollande's report speaks of what the French government sees as tax avoidance by major internet companies who collect what France sees as the "raw material of the digital economy."

Continue Reading...

As Curiosity rover touchdown nears, US says it won’t go to Mars alone

As Curiosity rover touchdown nears, US says it won’t go to Mars alone

We're just days away from the Curiosity rover's touchdown on the surface of Mars, and with the historic event quickly approaching, NASA has started thinking about the future. Specifically, NASA chief Charles Bolden is thinking of manned missions to the red planet, which are planned to occur sometime in the 2030s. The US has been talking about manned missions to Mars for quite some time now, but when the moment finally arrives, Bolden says that the US won't be going it alone.

Continue Reading...

US officials say cyber crimes will overtake terrorism as top threat

US officials say cyber crimes will overtake terrorism as top threat

Just as authentication service VeriSign admitted it has been hit by very strong hacking attacks a couple years ago, US officials have revealed that computer crimes will be more of a threat to the country than terrorism. VeriSign is an example of how cyber attacks can affect tens of millions of civilians, but government offices are also the target of malicious hackers.

Continue Reading...