The hidden world of labor trafficking

When it comes to human trafficking, we often hear about victims being kidnapped or violently taken from their homes. But what about people who are forced into labor in the U.S.?

US states probe JPMorgan data theft

US states are investigating a cyberattack against JPMorgan Chase that stole customer information, it emerged Friday, a day after the big bank revealed the massive scope of the breach .

Law enforcement grapples with iPhone's enhanced encryption

Apple is no stranger to disruption, having upended the music business with iTunes and the mobile industry with the iPhone. But now, some law enforcement officials are warning that the company is threatening to disrupt their ...

DARPA technology identifies counterfeit microelectronics

Advanced software and equipment to aid in the fight against counterfeit microelectronics in U.S. weapons and cybersecurity systems has been transitioned to military partners under DARPA's Integrity and Reliability of Integrated ...

Mapping the connections between diverse sets of data

What is a map? Most often, it's a visual tool used to demonstrate the relationship between multiple places in geographic space. They're useful because you can look at one and very quickly pick up on the general outlines of ...

US court weighs police use of cellphone tower data

A U.S. appeals court is wrestling with whether law enforcement has the authority to obtain and use records from cellphone towers, in a case that weighs the importance of people's right to privacy in the age of digital technology.

page 8 from 13