Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Cyber-espionage

USA-SECURITY-CHINA-SNOWDEN/
RTX10LY6 
June 13, 2013 
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo... 
Hong Kong, China 
Protesters supporting Snowden hold a photo of him during a demonstration outside the U.S. Consulate in... 
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo of Snowden during a demonstration outside the U.S. Consulate in Hong Kong June 13, 2013. China's Foreign Ministry offered no details on Thursday on Snowden, the National Security Agency contractor who revealed the U.S. government's top-secret monitoring of phone and Internet data and who is in hiding in Hong Kong. REUTERS/Bobby Yip (CHINA - Tags: POLITICS SCIENCE TECHNOLOGY CIVIL UNREST TPX IMAGES OF THE DAY) 
USA-CYBERSECURITY/
RTX10LF4 
June 12, 2013 
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency... 
Washington, UNITED STATES 
General Keith Alexander arrives at a Senate Appropriations Committee hearing in Washington 
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service (CSS), arrives at the Senate Appropriations Committee hearing on Cybersecurity: Preparing for and Responding to the Enduring Threat, on Capitol Hill in Washington June 12, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY) 
INTERNET-ATTACK/
RTXXZVX 
March 27, 2013 
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One... 
Warsaw, Poland 
Illustration file picture shows a man typing on a computer keyboard in Warsaw 
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY) 
CYBERSECURITY/IRAN
RTR2UQCC 
December 02, 2011 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences... 
Charlotte, UNITED STATES 
To match Insight - CYBERSECURITY/IRAN 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, works on his laptop computer during a portrait session in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY) 
CYBERSECURITY/IRAN
RTR2UQCA 
December 02, 2011 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences... 
Charlotte, UNITED STATES 
To match Insight - CYBERSECURITY/IRAN 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY) 
Technology
Technology 
Top Secret Cyber Security Center - 07 Oct 2011 
15 PICTURES 
USA/
RTR2S0PH 
September 28, 2011 
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense... 
Idaho Falls, UNITED STATES 
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense... 
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense lab at the Idaho National Laboratory in Idaho Falls, Idaho September 29, 2011. REUTERS/Jim Urquhart (UNITED STATES - Tags: CRIME LAW MILITARY POLITICS SCIENCE TECHNOLOGY) 
CHINA-USA/CYBERESPIONAGE
RTR2L8E1 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", gestures while speaking to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: POLITICS SCI TECH) 
CHINA-USA/CYBERESPIONAGE
RTR2L8DO 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", sits down while speaking to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW POLITICS SCI TECH) 
CHINA-USA/CYBERESPIONAGE
RTR2L8DK 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", reviews his contents page in his office in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW POLITICS SCI TECH) 
CHINA-USA/CYBERESPIONAGE
RTR2L8DG 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", looks at papers while speaking to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW POLITICS SCI TECH) 
CHINA-USA/CYBERESPIONAGE
RTR2L8DD 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", is seen while speaking to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: HEADSHOT POLITICS SCI TECH CRIME LAW) 
CHINA-USA/CYBERESPIONAGE
RTR2L8DB 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", speaks to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: POLITICS SCI TECH CRIME LAW) 
CHINA-USA/CYBERESPIONAGE
RTR2L8CV 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", is seen while speaking to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. Picture taken March 22, 2011. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: HEADSHOT POLITICS SCI TECH) 
CHINA-USA/CYBERESPIONAGE
RTR2L8BS 
April 14, 2011 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence... 
Washington, UNITED STATES 
To match Special Report CHINA-USA/CYBERESPIONAGE 
Joel Brenner, former counterintelligence chief for the Office of the Director of National Intelligence and author of a forthcoming book on cyber-espionage tentatively titled "America the Vulnerable", speaks to Reuters in Washington, March 22, 2011. As America and China grow more economically and financially intertwined, the two nations have also stepped up spying on each other. Today, most of that is done electronically, with computers rather than listening devices in chandeliers or human moles in tuxedos. And at the moment, many experts believe China may have gained the upper hand. To match Special Report CHINA-USA/CYBERESPIONAGE REUTERS/Hyungwon Kang (UNITED STATES - Tags: HEADSHOT POLITICS SCI TECH) 
USA-CYBERWAR/
RTXT2ZC 
October 05, 2010 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Colorado Springs, UNITED STATES 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2Z7 
October 05, 2010 
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force... 
Colorado Springs, UNITED STATES 
TSgt James Ortiz looks over a rack in the server room at the Air Force Space Command Network Operations... 
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2WG 
October 05, 2010 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Colorado Springs, UNITED STATES 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2VH 
October 05, 2010 
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security... 
Colorado Springs, UNITED STATES 
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security... 
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2UX 
October 05, 2010 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Colorado Springs, UNITED STATES 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center... 
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST) 
USA-CYBERWAR/
RTXT2UT 
October 05, 2010 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force... 
Colorado Springs, UNITED STATES 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force... 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2UR 
October 05, 2010 
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations... 
Colorado Springs, UNITED STATES 
MSgt Michael Gregory, works at the Air Force Space Command Network Operations & Security Center at Peterson... 
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST) 
USA-CYBERWAR/
RTXT2UN 
October 05, 2010 
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the... 
Arlington, UNITED STATES 
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the... 
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the media on Cyber Storm III exercise at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2SX 
October 05, 2010 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration... 
Arlington, UNITED STATES 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration... 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2SN 
October 05, 2010 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration... 
Arlington, UNITED STATES 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration... 
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2SH 
October 05, 2010 
An analyst from the U.S. Department of Homeland Security is pictured at the National Cybersecurity &... 
Arlington, UNITED STATES 
U.S. Department of Homeland Security analyst is pictured at the National Cybersecurity & Communications... 
An analyst from the U.S. Department of Homeland Security is pictured at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS) 
USA-CYBERWAR/
RTXT2YB 
October 04, 2010 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force... 
Colorado Springs, UNITED STATES 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force... 
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS) 
CANADA/
RTR2CI0D 
April 06, 2010 
Nart Villeneuve speaks during the release of the report 'Shadows In The Clouds: An Investigation Into... 
Toronto, Canada 
Nart Villeneuve speaks during the release of the report 'Shadows In The Clouds: An Investigation Into... 
Nart Villeneuve speaks during the release of the report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' by the Information Warfare Monitor and the Shadowserver Foundation during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: CRIME LAW SCI TECH) 
CANADA/
RTR2CI0B 
April 06, 2010 
Ron Deibert speaks during the release of the report 'Shadows In The Clouds: An Investigation Into Cyber... 
Toronto, Canada 
Deibert speaks during the release of the report by the Information Warfare Monitor and the Shadowserver... 
Ron Deibert speaks during the release of the report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' by the Information Warfare Monitor and the Shadowserver Foundation during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/ Mike Cassese (CANADA - Tags: CRIME LAW SCI TECH) 
CANADA/
RTR2CI07 
April 06, 2010 
Members of the Information Warfare Monitor and the Shadowserver Foundation Greg Walton (L), Ron Deibert... 
Toronto, Canada 
Members of the Information Warfare Monitor and the Shadowserver Foundation release their report during... 
Members of the Information Warfare Monitor and the Shadowserver Foundation Greg Walton (L), Ron Deibert and Nart Villeneuve (R) release their report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: SCI TECH CRIME LAW) 
CANADA/
RTR2CI06 
April 06, 2010 
Members of the Information Warfare Monitor and the Shadowserver Foundation Greg Walton and Ron Deibert... 
Toronto, Canada 
Members of the Information Warfare Monitor and the Shadowserver Foundation Walton and Deibert release... 
Members of the Information Warfare Monitor and the Shadowserver Foundation Greg Walton and Ron Deibert (R) release their report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: CRIME LAW SCI TECH) 
CANADA/
RTR2CI02 
April 06, 2010 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert (L) and Nart Villeneuve... 
Toronto, Canada 
Members of the Information Warfare Monitor and the Shadowserver Foundation Deibert and Villeneuve release... 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert (L) and Nart Villeneuve release their report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: SCI TECH CRIME LAW) 
CANADA/
RTR2CI00 
April 06, 2010 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert and Nart Villeneuve... 
Toronto, Canada 
Members of the Information Warfare Monitor and the Shadowserver Foundation Deibert and Villeneuve smile... 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert and Nart Villeneuve (R) smile after the release of their report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: CRIME LAW SCI TECH) 
CANADA/
RTR2CHZY 
April 06, 2010 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert and Nart Villeneuve... 
Toronto, Canada 
Members of the Information Warfare Monitor and the Shadowserver Foundation Deibert and Villeneuve release... 
Members of the Information Warfare Monitor and the Shadowserver Foundation Ron Deibert and Nart Villeneuve (R) release their report 'Shadows In The Clouds: An Investigation Into Cyber Espionage 2.0' during a news conference in Toronto April 6, 2010. The report documents cyber espionage that compromised computer systems in India, the Offices of the Dalai Lama, the United Nations and several other countries. REUTERS/Mike Cassese (CANADA - Tags: SCI TECH CRIME LAW) 
Sort by 
Display 
Items per page 
Page 
of 2