<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Salon.com > Hacking</title>
	<atom:link href="http://www.salon.com/topic/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.salon.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 May 2013 03:47:40 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>Dutch police may get right to hack into computers</title>
		<link>http://www.salon.com/2013/05/02/dutch_police_may_get_right_to_hack_into_computers/</link>
		<comments>http://www.salon.com/2013/05/02/dutch_police_may_get_right_to_hack_into_computers/#comments</comments>
		<pubDate>Thu, 02 May 2013 19:23:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Holland]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[spyware]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13287788</guid>
		<description><![CDATA[Under new bill, investigators would be able to hack into computers, install spyware, read emails and destroy files]]></description>
			<content:encoded><![CDATA[<p>The Dutch government has proposed a bill that would give police far-reaching powers to fight cybercrime, while creating a dangerous precedent for police hacking codified into law.<a href="http://www.bbc.co.uk/news/world-europe-22384145"> Via the BBC:</a></p><blockquote><p>Under a new bill, investigators would be able to hack into computers, install spyware, read emails and destroy files.</p> <p>They could also break into servers located abroad, if they were being used to block services.</p> <p>Critics say the proposed measures are unnecessary and could set a dangerous precedent for people living under oppressive governments.</p> <p>Use of the powers would be subject to the approval of a judge, the government stresses.</p> <p>The bill would also make it a crime for a suspect to refuse to decipher encrypted files during a police investigation.</p></blockquote><p><a href="http://www.salon.com/2013/05/02/dutch_police_may_get_right_to_hack_into_computers/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/05/02/dutch_police_may_get_right_to_hack_into_computers/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Former Reuters employee pleads not guilty to Anonymous charges</title>
		<link>http://www.salon.com/2013/04/24/former_reuters_employee_pleads_not_guilty_to_anonymous_charges/</link>
		<comments>http://www.salon.com/2013/04/24/former_reuters_employee_pleads_not_guilty_to_anonymous_charges/#comments</comments>
		<pubDate>Wed, 24 Apr 2013 15:34:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Reuters]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Tribune company]]></category>
		<category><![CDATA[matthew keys]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13280788</guid>
		<description><![CDATA[Matthew Keys was fired this week from Reuters for reasons reportedly unrelated to his federal charges]]></description>
			<content:encoded><![CDATA[<p>Matthew Keys -- the social media editor fired from his position at Reuters Monday for reasons he believes could be political -- pleaded not guilty Tuesday to federal charges that he conspired with members of Anonymous to attack websites of  the Tribune Co., his former employer.</p><p><a href="http://big.assets.huffingtonpost.com/MatthewKeysIndictment.pdf" target="_hplink">According to the government's indictment</a>, Keys provided Anonymous hackers with information including usernames and passwords to access Tribune Co. sites in late 2010, after he was fired from his job at a Tribune-owned station in Sacramento, Calif. Keys has rejected a plea bargain and, if found guilty, could face up to 25 years in prison and a fine of up to $750,000. His attorneys argue that although Keys had communicated with Anons via online chat rooms, it was someone posing as the journalist who provided the Tribune Co. access to information.</p><p>"There's an incongruity to all of this that we're hoping to get to the bottom of in the next couple months," Keys' attorney Jay Leiderman<a href="http://www.huffingtonpost.com/2013/04/23/matthew-keys-arraignment_n_3136418.html"> told HuffPo.</a></p><p><a href="http://www.salon.com/2013/04/24/former_reuters_employee_pleads_not_guilty_to_anonymous_charges/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/04/24/former_reuters_employee_pleads_not_guilty_to_anonymous_charges/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anonymous hits Israel over Gaza strikes</title>
		<link>http://www.salon.com/2013/04/07/anonymous_hits_israel_over_gaza_strikes/</link>
		<comments>http://www.salon.com/2013/04/07/anonymous_hits_israel_over_gaza_strikes/#comments</comments>
		<pubDate>Sun, 07 Apr 2013 16:17:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Palestine]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[#OpIsrael]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13264116</guid>
		<description><![CDATA[#OpIsrael picks up over the weekend, taking down numerous government websites]]></description>
			<content:encoded><![CDATA[<p>During Israel's Operation Pillar of Defense against Palestinians in Gaza last November, Anonymous hackers launched a mass attack on Israeli government websites. In response to the eight day assault that killed 133 Palestinians, Anonymous' #OpIsrael defaced thousands of Israeli sites and provided information for Gazans facing Internet and communications blackouts. 60 million hacking attempts were reportedly made.</p><p>Last week, Israeli airstrikes once again hit targets in Gaza, officially breaking a ceasefire established last November (although cross-border clashes have informally breached the ceasefire in recent months, leaving four Palestinians dead). In retaliation, Anonymous relaunched #OpIsrael this weekend, and according to an Anonymous spokesperson offering a partial damage report, 60,000 websites, 40,000 Facebook pages, 5,000 twitter accounts and 30,000 Israeli bank accounts got hacked, causing an estimated $3-plus billion damage, the hacker collective claim. "Not bad for 24 hours," Anonymous noted.</p><p><a href="http://www.salon.com/2013/04/07/anonymous_hits_israel_over_gaza_strikes/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/04/07/anonymous_hits_israel_over_gaza_strikes/feed/</wfw:commentRss>
		<slash:comments>55</slash:comments>
		</item>
		<item>
		<title>Attorneys launch Whistleblower Defense League</title>
		<link>http://www.salon.com/2013/04/02/attorneys_launch_whistleblower_defense_league/</link>
		<comments>http://www.salon.com/2013/04/02/attorneys_launch_whistleblower_defense_league/#comments</comments>
		<pubDate>Tue, 02 Apr 2013 15:22:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Whistleblowers]]></category>
		<category><![CDATA[Activism]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[lawyers]]></category>
		<category><![CDATA[Civil Liberties]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13258779</guid>
		<description><![CDATA[Well-known hacker, activist defenders join to form a legal "firewall" for whistleblowers]]></description>
			<content:encoded><![CDATA[<p>Hacktivist <a href="http://www.salon.com/2013/02/21/jeremy_hammond_speaks_out_from_solitary_confinement/">Jeremy Hammond</a> currently awaits trial in a federal prison cell and could receive life in prison; Bradley Manning saw his 1,000 day pretrial military detention last month; <a href="https://www.salon.com/2013/03/18/hacker_weev_gets_3_years_for_accessing_att_data/">Andrew “Weev” Auernheimer </a>has been handed a 41-month prison stint after his found and exploited a security flaw in an AT&amp;T server; Aaron Swartz's federal trial over the downloading of millions of online academic articles would have begun this week, had the young technologist not hanged himself earlier this year. The legal challenges facing whistleblowers and free-data activists, crystallized in these high profile examples to name just a few, have risen to the fore in recent months.</p><p><a href="http://www.salon.com/2013/04/02/attorneys_launch_whistleblower_defense_league/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/04/02/attorneys_launch_whistleblower_defense_league/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wisconsin man indicted over Anonymous attack on Kochs</title>
		<link>http://www.salon.com/2013/03/28/wisconsin_man_indicted_over_anonymous_attack_on_kochs/</link>
		<comments>http://www.salon.com/2013/03/28/wisconsin_man_indicted_over_anonymous_attack_on_kochs/#comments</comments>
		<pubDate>Thu, 28 Mar 2013 13:32:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Wisconsin]]></category>
		<category><![CDATA[Koch Brothers]]></category>
		<category><![CDATA[Scott Walker]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Unions]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13254511</guid>
		<description><![CDATA[During the 2011 Wisconsin protests, the hacker collective carried out a DDoS attack against two Koch websites]]></description>
			<content:encoded><![CDATA[<p>A Wisconsin man has been arrested in relation to a cyberattack claimed by Anonymous against the Koch Industries website during protests over labor rights in the state's capital in 2011. As Matt Pearce <a href="http://www.latimes.com/news/nation/nationnow/la-na-nn-anonymous-koch-hack-20130327,0,1118707.story">reported</a> for the Los Angeles Times, "Officials said Eric J. Rosol, 37, of Black Creek, Wis., participated in an Anonymous-organized shutdown of Koch websites www.kochind.com and www.quiltednorthern.com on Feb. 27 and 28 in 2011."</p><p>The Anonymous action, carried out in support of public sector unions fighting to save collective bargaining rights against Wisconsin Gov. Scott Walker's union-busting efforts, was not a hack. Rather, the hacker collective orchestrated a denial-of-service attack, or a DDOS,  encouraging users to repeatedly access the website until it's too overwhelmed to function. The Koch sites were successfully but only temporarily brought down. Rosol is the first and only defendant charged in the attack. Via Pearce:</p><p><a href="http://www.salon.com/2013/03/28/wisconsin_man_indicted_over_anonymous_attack_on_kochs/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/28/wisconsin_man_indicted_over_anonymous_attack_on_kochs/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Government uses video games to recruit teen hackers</title>
		<link>http://www.salon.com/2013/03/25/government_uses_video_games_to_recruit_hackers/</link>
		<comments>http://www.salon.com/2013/03/25/government_uses_video_games_to_recruit_hackers/#comments</comments>
		<pubDate>Mon, 25 Mar 2013 13:30:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[dhs]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Video Games]]></category>
		<category><![CDATA[chia]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13251026</guid>
		<description><![CDATA[Taking a cue from China, U.S. agencies seek out the next generation of cyberdefense workers young]]></description>
			<content:encoded><![CDATA[<p>It's no news that the U.S. government is targeting young hackers -- but their interest is not just prosecution. As the <a href="http://www.nytimes.com/2013/03/25/technology/united-states-wants-to-attract-hackers-to-public-sector.html?pagewanted=1&amp;hp">New York Times noted </a>Sunday, the Department of Homeland Security  -- following in the footsteps of the National Security Agency -- is using computer game competitions to scout high-school hackers as possible recruits to their cyberdefense ranks.</p><p>The Times noted that , "the idea of using competitions came, in part, from China, where the People’s Liberation Army runs challenges every spring to identify its next generation of digital warriors." This is just another arena in which the cat-and-mouse cyberwar between the U.S. and China (usually with the U.S. intelligence community at the forefront) is taking shape.</p><p>Via the Times:</p><p><a href="http://www.salon.com/2013/03/25/government_uses_video_games_to_recruit_hackers/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/25/government_uses_video_games_to_recruit_hackers/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Twitter co-founder: Hacking not necessarily a crime</title>
		<link>http://www.salon.com/2013/03/21/twitter_co_founder_hacking_not_necessarily_a_crime/</link>
		<comments>http://www.salon.com/2013/03/21/twitter_co_founder_hacking_not_necessarily_a_crime/#comments</comments>
		<pubDate>Thu, 21 Mar 2013 19:41:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[jack dorsey]]></category>
		<category><![CDATA[weev]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Internet]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13248276</guid>
		<description><![CDATA[Jack Dorsey told Lara Logan how hacking launched his career and should not always be framed as criminal]]></description>
			<content:encoded><![CDATA[<p><a href="http://techcrunch.com/2013/03/21/former-teenage-hacker-and-twitter-co-founder-jack-dorsey-says-hacking-isnt-a-crime/">TechCrunch reported</a> Thursday on an interchange between Twitter co-founder Jack Dorsey and Lara Logan in which the former boy hacker delineates the difference between "criminal hacking" and the sort of activity that has fallen under "criminal" designations owing to the Computer Fraud and Abuse Act. He recounted to Logan how he was hired by a software firm after he found a security flaw in its security system through hacking. TechCrunch reprinting the dialogue:</p><blockquote><p><em>Jack Dorsey</em>: I found a way into the website. I found a hole. I found a security hole.</p> <p><em>Lara Logan</em>: Is that– are you– is that the same thing as hacking?</p> <p><em>Jack Dorsey</em>: It’s– ha– yes. Hacking– hacking is– hacking is– is–</p> <p><em>Lara Logan</em>: A crime.</p> <p><em>Jack Dorsey</em>: Well, no. Criminal hacking is a crime. Hacking is actually a–</p> <p><em>Lara Logan</em>: Hacking for a job application is not a crime?</p> <p><em>Jack Dorsey</em>: <strong>No, no, no, no, no. No, not a crime at all.</strong> And I emailed them and I said, “You have a security hole. Here’s how to fix it. And I write dispatch software.” And–</p> <p><em>Lara Logan</em>: And they hired you.</p> <p><em>Jack Dorsey</em>: And they hired me a week later. And it was a dream come true, which is a weird dream for a kid.</p></blockquote><p>Hacker Andrew "Weev" Auernheimer was this week sentenced to 41 months in prison for finding a security flaw in AT&amp;T's server, and leaking information to Gawker. As Weev told Salon, “The government asserted that after the fact, they can declare a given access to data anyone makes public ‘unauthorized’ and have you thrown in prison." Therein lies the risks of the dangerously broad CFAA.</p><p><a href="http://www.salon.com/2013/03/21/twitter_co_founder_hacking_not_necessarily_a_crime/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/21/twitter_co_founder_hacking_not_necessarily_a_crime/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>MIT agrees to release redacted Aaron Swartz files</title>
		<link>http://www.salon.com/2013/03/20/mit_agrees_to_release_redacted_aaron_swartz_files_ap/</link>
		<comments>http://www.salon.com/2013/03/20/mit_agrees_to_release_redacted_aaron_swartz_files_ap/#comments</comments>
		<pubDate>Wed, 20 Mar 2013 14:09:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Aaron Swartz]]></category>
		<category><![CDATA[MIT]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[jstor]]></category>
		<category><![CDATA[justice department]]></category>
		<category><![CDATA[aol_on]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13246732</guid>
		<description><![CDATA[The university president announced documents related to the technologist's prosecution will be made public]]></description>
			<content:encoded><![CDATA[<div id="article-body-blocks"> <p>The president of the Massachusetts Institute of Technology announced on Tuesday that the school will voluntarily release public documents related to the prosecution of the free-information activist Aaron Swartz, who killed himself in January as he faced trial on hacking charges.</p> <p>The email announcement by MIT president L Rafael Reif came in response to a request on Friday by lawyers for Swartz's estate to have the US district court in Boston make the documents public. The university has come under fire for what critics say is its compliance with federal prosecutors in the legal case against Swartz. Supporters of Swartz have painted him as a zealous advocate of public online access, a martyred hero hounded to his death by the government he antagonized.</p> <p>To prosecutors, the 26-year-old Swartz was a thief whose aims to make information available didn't excuse the illegal acts he was charged with: breaking into a wiring closet at MIT and tapping into its computer network to download millions of paid-access scholarly articles, which he planned to share publicly. Swartz was facing possibly decades in prison after being indicted in Boston in 2011 when he hanged himself in his Brooklyn, New York, apartment.</p> <p>The documents will be released at the same time as an internal analysis of MIT's role in the Swartz case is made public. No date has been set for the release of that analysis, which is being conducted by professor Hal Abelson. The documents will have MIT employees' names blacked out in order to protect their safety, Reif wrote. The university will also black out information that might open it to further hacking attacks.</p> <p>"In the time since Aaron Swartz's suicide, we have seen a pattern of harassment and personal threats," Reif wrote. "In this volatile atmosphere, I have the responsibility to protect the privacy and safety of those members of our community who have become involved in this matter in the course of doing their jobs for MIT, and to ensure a safe environment for all of us who call MIT home."</p> <p>Swartz's family said his death was "the product of a criminal justice system rife with intimidation and prosecutorial overreach". Federal prosecutors have defended their pursuit of the case and say Swartz was offered a deal under which he would have spent just four to six months in prison. Charges were dropped after Swartz's death.</p> <p>A lawyer for Swartz's estate welcomed Reif's decision, but questioned MIT's need for secrecy and worried that documents with names blacked out would be "incomprehensible and impossible to follow". "It's long overdue that they've agreed to release something," San Francisco-based attorney Elliot Peters said. "But I don't see the reason to redact. I am not aware of any threats having been made to anybody at MIT. I don't know why that's a concern."</p> <p>Lawyers for Swartz's estate said in their filing on Friday that "the public has an important and clearly established interest in receiving the information necessary to understand the events that led to Aaron Swartz's arrest and indictment."</p> <p>Peters said: "It would show what happened and show the role MIT had in this."</p> <p>The lawyers asked that names remain in the documents if released. "Redaction of these individuals' names would merely add a layer of confusion and opacity to the documents without any additional privacy benefit," they wrote.</p> <p>MIT's computer system has been hacked a number times since Swartz's death. The campus was placed into lockdown last month when someone called to report a gunman in a university building. MIT later said the gunman report was a hoax apparently prompted by Swartz's death.</p> <p>&nbsp;</p> <p><img class="fiveminVideoPlayer" style="width: 570px; height: 411px; display: block;" src="https://spthumbnails.5min.com/10354317/517715821_c_570_411.jpg" alt="MIT Officials Harassed After Aaron Swartz Death" data-product="playerSeed" data-params="playList=517715821|||height=411|||width=570|||sid=1236|||origin=fts|||relatedMode=2|||relatedBottomHeight=60|||companionPos=below|||hasCompanion=true|||autoStart=false|||colorPallet=%23FF0000|||videoControlDisplayColor=%23191919|||shuffle=0|||isAP=1" /></p> </div><p><a href="http://www.salon.com/2013/03/20/mit_agrees_to_release_redacted_aaron_swartz_files_ap/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/20/mit_agrees_to_release_redacted_aaron_swartz_files_ap/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five things we know about &#8220;Guccifer&#8221;</title>
		<link>http://www.salon.com/2013/03/19/five_things_we_know_about_guccifer/</link>
		<comments>http://www.salon.com/2013/03/19/five_things_we_know_about_guccifer/#comments</comments>
		<pubDate>Tue, 19 Mar 2013 19:00:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[guccifer]]></category>
		<category><![CDATA[AOL]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[George W. Bush]]></category>
		<category><![CDATA[sidney blumenthal]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13245882</guid>
		<description><![CDATA[The unidentified hacker hits high profile targets, has a penchant for AOL mail and Comic Sans]]></description>
			<content:encoded><![CDATA[<p>As we<a href="http://www.salon.com/2013/03/19/hacker_guccifer_distributes_hillary_clintons_libya_memos/"> noted</a> earlier Tuesday, the hacker known as "Guccifer" has struck again, disseminating via playful emails memos from Hillary Clinton (hacked from the email account of Sid Blumenthal). But what do we know about this political prankster?</p><p><strong>1. "Guccifer" hits high profile targets from both sides of the aisle:</strong></p><p>The hacker first rose to prominence with an audacious hack on Bush family email accounts. It was through this hack on several accounts that Guccifer obtained the now-infamous George W. Bush self-portrait of himself in the shower.</p><p><a href="http://www.thesmokinggun.com/documents/internet/bush-hackers-other-victims-637098">According to</a> the Smoking Gun, Guccifer's victim list also includes a "U.S. Senator, a senior United Nations official, security contractors in Iraq, two former FBI agents, and a Department of Defense supervisor."</p><p>Guccifer also <a href="http://www.thesmokinggun.com/buster/sidney-blumenthal/hacker-distributes-memos-784091">infiltrated </a>Colin Powell’s email account and defaced his Facebook page, uploading posts including a message that read “You will burn in hell, Bush!”</p><p><a href="http://www.salon.com/2013/03/19/five_things_we_know_about_guccifer/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/19/five_things_we_know_about_guccifer/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Cyberwar manual: Civilian hackers can be targets</title>
		<link>http://www.salon.com/2013/03/19/nato_cyberwar_manual_civilian_hackers_can_be_targets/</link>
		<comments>http://www.salon.com/2013/03/19/nato_cyberwar_manual_civilian_hackers_can_be_targets/#comments</comments>
		<pubDate>Tue, 19 Mar 2013 14:10:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[hacktivists]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[stuxnet]]></category>
		<category><![CDATA[tallinn manual]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13245519</guid>
		<description><![CDATA[Handbook is first attempt to codify how international law applies to state-sponsored online attacks]]></description>
			<content:encoded><![CDATA[<p>With the support of NATO, legal experts have <a href="http://issuu.com/nato_ccd_coe/docs/tallinn_manual_draft?mode=window&amp;backgroundColor=%23222222">released a manual</a> as a first broad attempt to codify how international law applies to state-sponsored hacking. The handbook, authored by legal experts working in conjunction with the International Committee of the Red Cross and the U.S. Cyber Command, details what is or is not a legitimate target in cyberwarfare.</p><p>It states not only that full-scale conventional wars may be triggered by cyberattacks, but that civilian "hacktivists" can be targeted with conventional weapons if their cyberattacks seriously damage property or cause deaths. The handbook, titled "The <a title="" href="https://www.ccdcoe.org/405.html">Tallinn manual</a>," is primarily advisory and is not an official NATO document; the rules of cyberwarfare remain hotly debated. As the <a href="http://www.huffingtonpost.co.uk/2013/03/19/nato-cyber-warfare-manual_n_2906122.html">HuffPo U.K.</a> pointed out, experts <a href="http://www.guardian.co.uk/world/2013/mar/18/rules-cyberwarfare-nato-manual" target="_hplink">were divided</a> on exactly when a civilian hacker might be a target. The manual explicitly notes that consensus has not been reached on this issue:</p><p><a href="http://www.salon.com/2013/03/19/nato_cyberwar_manual_civilian_hackers_can_be_targets/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/19/nato_cyberwar_manual_civilian_hackers_can_be_targets/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Hacker &#8220;Guccifer&#8221; distributes Hillary Clinton&#8217;s Libya memos</title>
		<link>http://www.salon.com/2013/03/19/hacker_guccifer_distributes_hillary_clintons_libya_memos/</link>
		<comments>http://www.salon.com/2013/03/19/hacker_guccifer_distributes_hillary_clintons_libya_memos/#comments</comments>
		<pubDate>Tue, 19 Mar 2013 13:10:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[guccifer]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[sidney blumenthal]]></category>
		<category><![CDATA[Benghazi attack]]></category>
		<category><![CDATA[AOL]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13245481</guid>
		<description><![CDATA[The hacker obtained confidential emails from former WH aide Sidney Blumenthal's email account [UPDATED]]]></description>
			<content:encoded><![CDATA[<p><strong>Update – March 19, 11:33 a.m.:</strong> This post is updated to reflect the fact that Sidney Blumenthal was formerly a Washington bureau chief for Salon.</p><p><strong>From earlier:</strong></p><p>Last week it was reported that a hacker going by "Guccifer" had gained access to the personal email account of former Clinton White House aide (and confidant to Hillary) Sidney Blumenthal. On Tuesday, <a href="http://www.thesmokinggun.com/buster/sidney-blumenthal/hacker-distributes-memos-784091">according to The Smoking Gun</a>, Guccifer began sharing contents found in Blumenthal AOL account (yes, Sidney Blumenthal still uses AOL mail).</p><p>In playful emails, the hacker disseminated four recent memos on Libya sent by former Secretary of State Hillary Clinton to a "wide array of congressional aides, political figures, and journalists worldwide." The Smoking Gun reported that, "most of the e-mail recipients were sent four separate memos that were e-mailed to Clinton by Blumenthal during the past five months. Each memo dealt with assorted developments in Libya, including the September 11, 2012 attack on the U.S. mission in Benghazi. One memo marked “Confidential” was sent to Clinton on September 12."</p><p><a href="http://www.salon.com/2013/03/19/hacker_guccifer_distributes_hillary_clintons_libya_memos/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/19/hacker_guccifer_distributes_hillary_clintons_libya_memos/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Hacker &#8220;Weev&#8221; gets three years for accessing AT&amp;T data</title>
		<link>http://www.salon.com/2013/03/18/hacker_weev_gets_3_years_for_accessing_att_data/</link>
		<comments>http://www.salon.com/2013/03/18/hacker_weev_gets_3_years_for_accessing_att_data/#comments</comments>
		<pubDate>Mon, 18 Mar 2013 18:48:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[weev]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[cfaa]]></category>
		<category><![CDATA[andrew auernheimer]]></category>
		<category><![CDATA[cybercrime]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13244658</guid>
		<description><![CDATA[Andrew Auernheimer is the latest victim in the government's crackdown on loosely determined cybercrimes]]></description>
			<content:encoded><![CDATA[<p>Before Andrew "Weev" Auernheimer entered the Newark courtroom Monday to receive his sentence and begin a 41-month stint in prison, the loudmouthed hacker stood before gathered supporters and read from Keats' "The Fall of Hyperion - A Dream."</p><p>"<span>Fanatics have their dreams, wherewith they weave/ A paradise for a sect</span>; <span>the savage too/ From forth the loftiest fashion of his sleep/ Guesses at Heaven ...</span>" So begins the epic -- an appropriately grandiose reading for the hacker-cum-troll to choose. Keats' poem tells a story of transcendence, in which poets and dreamers are challenged, persecuted and deified. And Auernheimer (his tongue ever wedged in his cheek) is asking for a little deification too. He is the latest victim in the government's harsh crackdown on hackers -- and he wants you to know it.</p><p><a href="http://www.salon.com/2013/03/18/hacker_weev_gets_3_years_for_accessing_att_data/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/18/hacker_weev_gets_3_years_for_accessing_att_data/feed/</wfw:commentRss>
		<slash:comments>15</slash:comments>
		</item>
		<item>
		<title>Reuters&#8217; Matthew Keys indicted for aiding Anonymous</title>
		<link>http://www.salon.com/2013/03/14/reuters_matthew_keys_indicted_aiding_anonymous/</link>
		<comments>http://www.salon.com/2013/03/14/reuters_matthew_keys_indicted_aiding_anonymous/#comments</comments>
		<pubDate>Thu, 14 Mar 2013 21:20:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[matthew keys]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Tribune company]]></category>
		<category><![CDATA[Reuters]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13229477</guid>
		<description><![CDATA[The DoJ announced that the social media editor faces charges over hacks into a Tribune Company website]]></description>
			<content:encoded><![CDATA[<p><strong>Updated, March 15.: </strong>According to the<a href="http://hosted.ap.org/dynamic/stories/U/US_JOURNALIST_CHARGED_HACKING?SITE=AP&amp;SECTION=HOME&amp;TEMPLATE=DEFAULT&amp;CTIME=2013-03-15-12-45-30"> AP, </a>Reuters has suspended Matthew Keys with pay. Keys took to Twitter to reassure friends that he is "fine." He noted, "I found out the same way most of you did: From Twitter. Tonight I'm going to take a break. Tomorrow, business as usual."</p><p>&nbsp;</p><p><strong>Original post:</strong> Matthew Keys, a deputy social media editor for Reuters, could face up to 25 years in prison. According to a Justice Department announcement Keys has been indicted for allegedly providing members of Anonymous with log-in credentials for a computer server belonging to the Tribune Company (where Keys formerly worked), according to the DoJ's press release.</p><p>Via the <a href="http://www.justice.gov/opa/pr/2013/March/13-crm-311.html">DoJ</a>:</p><p><a href="http://www.salon.com/2013/03/14/reuters_matthew_keys_indicted_aiding_anonymous/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/14/reuters_matthew_keys_indicted_aiding_anonymous/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. database on cyber-vulnerabilities is hacked</title>
		<link>http://www.salon.com/2013/03/14/u_s_database_on_cyber_vulnerabilities_is_hacked/</link>
		<comments>http://www.salon.com/2013/03/14/u_s_database_on_cyber_vulnerabilities_is_hacked/#comments</comments>
		<pubDate>Thu, 14 Mar 2013 18:06:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Cyber-attack]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13229228</guid>
		<description><![CDATA[Ironically, the government site that catalogs vulnerability to malware is brought down by malware]]></description>
			<content:encoded><![CDATA[<p>A government database on computer vulnerability has a vulnerability problem of its own. According to reports Thursday, the National Vulnerability Database website -- which includes databases of security checklists and security-related software flaws -- was among sites taken down for two weeks after malware was discovered on their servers.</p><p>A number of other sites also belonging to the National Institute of Standards and Technology were also affected. The government agency released the following statement:</p><blockquote><p>NIST began investigating the cause of the unusual activity and the servers were taken offline. Malware was discovered on two NIST Web servers and was then traced to a software vulnerability.</p></blockquote><p><a href="http://www.salon.com/2013/03/14/u_s_database_on_cyber_vulnerabilities_is_hacked/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/14/u_s_database_on_cyber_vulnerabilities_is_hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No &#8220;cyber Pearl Harbor&#8221; on the horizon</title>
		<link>http://www.salon.com/2013/03/13/no_cyber_pearl_harbor_on_the_horizon/</link>
		<comments>http://www.salon.com/2013/03/13/no_cyber_pearl_harbor_on_the_horizon/#comments</comments>
		<pubDate>Wed, 13 Mar 2013 12:19:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[cyberthreats]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[James Clapper]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[chinese hacking]]></category>
		<category><![CDATA[mandiant]]></category>
		<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">http://www.railrode.net/?p=13227537</guid>
		<description><![CDATA[Spy chief says Panetta's warning was premature given skills and motives of U.S. opponents]]></description>
			<content:encoded><![CDATA[<p>Contrary to former Defense Secretary Leon Panetta's ominous <a href="http://www.salon.com/2012/10/12/panetta_warns_of_cyber_pearl_harbor/">warning last year </a>that the U.S. could be vulnerable to a "cyber Pearl Harbor," director of national intelligence James Clapper said there were no current cyberthreats of this scale to U.S. infrastructure.</p><p>As <a href="http://www.wired.com/threatlevel/2013/03/no-cyber-pearl-harbor/">Wired's Kim Zetter</a> reported on Clapper's comments to the Senate Select Committee on Intelligence on Tuesday, he said "that lack of skills on the part of most attackers and the ability to override attacks on critical infrastructure with manual controls would make such attacks unfeasible in the near future. He also said that nation states that might have the skills to pull off such an attack lack the motive at this point."</p><p>Clapper stated (via Wired):</p><p><a href="http://www.salon.com/2013/03/13/no_cyber_pearl_harbor_on_the_horizon/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/03/13/no_cyber_pearl_harbor_on_the_horizon/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>China says U.S. hackers target its military websites</title>
		<link>http://www.salon.com/2013/02/28/china_says_u_s_hackers_target_its_military_websites/</link>
		<comments>http://www.salon.com/2013/02/28/china_says_u_s_hackers_target_its_military_websites/#comments</comments>
		<pubDate>Thu, 28 Feb 2013 14:00:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[pla]]></category>
		<category><![CDATA[Cold War]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">http://www.origin.railrode.net/?p=13214481</guid>
		<description><![CDATA[The Chinese defense ministry returns condemnation from White House over reported PLA hacks]]></description>
			<content:encoded><![CDATA[<p>While the Obama administration has condemned ongoing cyberattacks against U.S. institutions believed to originate with the Chinese military, China Thursday claimed it was a two-way street. China's defense minister said Thursday that of the approximately 1.7 million cyberattacks launched against two of its military websites last year, two-thirds came from the U.S..</p><p>"The defence ministry and China military online websites have faced a serious threat from hacking attacks since they were established, and the number of hacks has risen steadily in recent years," said a ministry spokesman, Geng Yansheng, on Thursday according to <a href="http://www.guardian.co.uk/world/2013/feb/28/china-cyber-attacks-military-website-us">Reuters</a>."According to the IP addresses, the websites were, in 2012, hacked on average from overseas 144,000 times a month, of which attacks from the US accounted for 62.9 percent."</p><p>China has called "groundless" claims that one of its military is responsible for hacks against U.S. corporations, newspapers and government sites, but evidence gathered by security firm Mandiant <a href="http://www.salon.com/2013/02/19/chinese_army_unit_tied_to_hacks_on_u_s/">reportedly points strongly </a>to one People’s Liberation Army unit based in the outskirts of Shanghai.</p><p><a href="http://www.salon.com/2013/02/28/china_says_u_s_hackers_target_its_military_websites/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/02/28/china_says_u_s_hackers_target_its_military_websites/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anonymous group claims to show BofA monitored hackers, activists</title>
		<link>http://www.salon.com/2013/02/27/anonymous_group_claims_to_show_bofa_monitored_hackers_activists/</link>
		<comments>http://www.salon.com/2013/02/27/anonymous_group_claims_to_show_bofa_monitored_hackers_activists/#comments</comments>
		<pubDate>Wed, 27 Feb 2013 18:10:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Bank of America]]></category>
		<category><![CDATA[Occupy]]></category>
		<category><![CDATA[Par:AnoIA]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://www.origin.railrode.net/?p=13213747</guid>
		<description><![CDATA[Hacker group leaks data reportedly from Bank of America showing (shoddy) monitoring of activist and hacker activity]]></description>
			<content:encoded><![CDATA[<p>An Anonymous group, identifying itself as Par:AnoIA (aka Anonymous Intelligence Agency) has released 14 Gigabytes of data, code and software that it claims shows how Bank of America employed security firms to monitor hackers and activists.</p><p>In a Wednesday <a href="http://par-anoia.net/assessment/us/bofa/bofa-press-release.pdf">press release</a>, Par:AnoIA stated that the data "shows that Bank of America and others are contracting other companies to spy and collect information on private citizens." The release also notes, however, that the "overall quality of the research is poor and potentially false."</p><p>The data was not obtained through any hack, but was "stored on a misconfigured server and basically open for grabs."</p><p>Leaked documents reveal that TEKSystems assembled  reports on both<a href="http://par-anoia.net/assessment/us/bofa/allTexts/emails/372.%207_24_2012%20-%20EWT%20TACTO%20-%20Occupy%20Tactical%20Breifing.txt"> Occupy  Wall Street online activity </a>and <a href="http://par-anoia.net/assessment/us/bofa/allTexts/emails/04.%2010_24_2012%20-%20Daily%20Cyber%20Threat%20Highlights%20-%2024%20October%202012.txt">hackers</a> throughout 2012. But  the hackers group called such "intelligence" "sloppy, random and valueless":</p><p><a href="http://www.salon.com/2013/02/27/anonymous_group_claims_to_show_bofa_monitored_hackers_activists/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/02/27/anonymous_group_claims_to_show_bofa_monitored_hackers_activists/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Trump lawyer: Twitter, cops investigating hack</title>
		<link>http://www.salon.com/2013/02/21/trump_lawyer_twitter_police_investigating_hack/</link>
		<comments>http://www.salon.com/2013/02/21/trump_lawyer_twitter_police_investigating_hack/#comments</comments>
		<pubDate>Thu, 21 Feb 2013 19:36:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[lil wayne]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://www.origin.railrode.net/?p=13207848</guid>
		<description><![CDATA[The Donald sent out an obscene rap lyric earlier -- but his special counsel tells Salon that police are on the case]]></description>
			<content:encoded><![CDATA[<p>"I just got done talking to the precinct," Donald Trump's executive vice president and special counsel, Michael Cohen, told Salon this afternoon. <a href="https://twitter.com/realdonaldtrump">Donald Trump's often-inflammatory Twitter feed</a> had taken an unusual turn this morning, with a single instance of a <a href="http://www.salon.com/2013/02/21/donald_trump_claims_lil_wayne_hoes_tweet_was_a_hack/">Lil Wayne lyric getting sent out</a>, then promptly deleted.</p><p>"The police and Twitter are both investigating," said the special counsel. He noted that he had just become aware "this has been happening a lot, with McDonald's and Ford" (in actuality, <a href="http://www.huffingtonpost.com/2013/02/18/burger-king-twitter-hacked_n_2711661.html">Burger King</a> and <a href="http://www.forbes.com/sites/dalebuss/2013/02/19/now-chrysler-social-media-ops-see-jeep-hacked-via-twitter/">Jeep</a>) getting hacked on Twitter. Cohen noted that Trump had been giving a speech in Florida at the time the Tweet was sent.</p><p>One possible explanation closed off? The notion that someone else has been writing Trump's tweets and inadvertently posted a personal update to the wrong account; Cohen said that Trump writes all his Tweets himself.</p><p><a href="http://www.salon.com/2013/02/21/trump_lawyer_twitter_police_investigating_hack/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/02/21/trump_lawyer_twitter_police_investigating_hack/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Donald Trump claims Lil Wayne &#8220;hoes&#8221; tweet was a hack</title>
		<link>http://www.salon.com/2013/02/21/donald_trump_claims_lil_wayne_hoes_tweet_was_a_hack/</link>
		<comments>http://www.salon.com/2013/02/21/donald_trump_claims_lil_wayne_hoes_tweet_was_a_hack/#comments</comments>
		<pubDate>Thu, 21 Feb 2013 17:30:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Politics]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[lil wayne]]></category>
		<category><![CDATA[hip-hop]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://www.origin.railrode.net/?p=13207625</guid>
		<description><![CDATA["These hoes think they classy, well that's the class I'm skippen," the original Trump tweet said]]></description>
			<content:encoded><![CDATA[<p>Donald Trump's Twitter account posted and then quickly deleted a tweet that quoted a Lil Wayne rap lyric, which Trump claims was the result of a hack.</p><p>The <a href="http://nymag.com/daily/intelligencer/2013/02/donald-trump-lil-wayne-hoes-tweet.html">original</a> tweet said: "These hoes think they classy, well that's the class I'm skippen."</p><p>Trump then tweeted:</p><p>[embedtweet id="304636780903288834"]</p><p><a href="http://www.salon.com/2013/02/21/donald_trump_claims_lil_wayne_hoes_tweet_was_a_hack/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/02/21/donald_trump_claims_lil_wayne_hoes_tweet_was_a_hack/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>Chinese army unit tied to hacks on U.S.</title>
		<link>http://www.salon.com/2013/02/19/chinese_army_unit_tied_to_hacks_on_u_s/</link>
		<comments>http://www.salon.com/2013/02/19/chinese_army_unit_tied_to_hacks_on_u_s/#comments</comments>
		<pubDate>Tue, 19 Feb 2013 14:00:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[All Salon]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[pla]]></category>
		<category><![CDATA[Unit 61398]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[New York Times]]></category>
		<category><![CDATA[mandiant]]></category>

		<guid isPermaLink="false">http://www.origin.railrode.net/?p=13205296</guid>
		<description><![CDATA[An infantry of hackers in one Shangai neighborhood are thought responsible for majority of attacks]]></description>
			<content:encoded><![CDATA[<p>Earlier this year, when the New York Times reported that it had been the <a href="http://www.salon.com/2013/01/31/nytimes_says_chinese_hackers_attacked_its_computers/singleton/">target of hacks </a>from China, the paper noted that the attacks were likely connected to the Chinese military. On Tuesday, the <a href="http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=3&amp;_r=1&amp;hp">Times reported</a> that, based on evidence confirmed by U.S. intelligence officials, there is "little doubt" that "an overwhelming percentage of the attacks on American corporations, organizations and government agencies" originate from one People’s Liberation Army unit based in the outskirts of Shanghai.</p><p>A study released Tuesday by U.S. security firm Mandiant identified PLA Unit 61398 as the most likely perpetrators of the hacks. Mandiant had been tracking hacks perpetrated by the so-called "Comment Crew" for over six years before concluding that the hackers were part of Unit 61398. Via the Times:</p><p><a href="http://www.salon.com/2013/02/19/chinese_army_unit_tied_to_hacks_on_u_s/">Continue Reading...</a></p>]]></content:encoded>
			<wfw:commentRss>http://www.salon.com/2013/02/19/chinese_army_unit_tied_to_hacks_on_u_s/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
	</channel>
</rss>