US politics
fromwww.npr.org
2 hours agoICE acknowledges it is using powerful spyware
ICE is using spyware tools to intercept encrypted messages to combat fentanyl trafficking.
Carrez calls this 'the survival problem,' and it forms part of his definition of sovereignty - digital, data, AI, and so on. He says, 'A lot of people are just talking about digital sovereignty as like a catchphrase for a bunch of things.'
66% of internet users live where political or social sites are blocked, and 78% are in countries where people have been arrested for online posts. New social media regulations have emerged in dozens of countries in the past year alone.
The attacks forced a reckoning with one of the most consequential design flaws in global digital infrastructure: the concentration of military and civilian data on the same physical servers, in facilities that could become military targets the moment a conflict begins.
When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.