March 4, 2013 Internet networks control more and more of our environment every day. And many of these things can be hacked. That's because over the past decade, the Internet and the mobile phone network have been layered on top of all kinds of technologies that weren't built with security in mind.
February 24, 2013 One dominant theme of the trip will be how to resolve the crisis in Syria, where an estimated 70,000 people have been killed over the past two years. Kerry is portraying his first trip as secretary of state as a listening tour, and he certainly expects to hear a lot about Syria.
February 23, 2013 U.S. counterterrorism efforts include choking off the flow of cash to extremists and urging friendly countries to help. But in places like the Nairobi neighborhood of Eastleigh, where Somali refugees have flocked, it's hard to distinguish between tainted money and honest cash.
February 20, 2013 Republicans delayed a vote on President Obama's defense nominee, saying they wanted more answers about the attack in Benghazi, Libya, last year. In recent months, Benghazi has become a sort of catchword. To Republicans, it symbolizes everything bad about the Obama administration.
February 20, 2013 President Obama and the Pentagon have recently raised concerns about the threats posed from cyber attacks. But there's no clear consensus on how best to address the problem.
February 19, 2013 WFAEIn Charlotte, N.C., a secret bunker rests quietly below a radio station. Built in 1963, it was part of a federal network designed to provide emergency communications in case of a nuclear attack. With a new slew of potential threats to contend with, FEMA has revived the idea.
February 19, 2013 The Chinese military unit allegedly behind cyberattacks on U.S. firms works out of a nondescript office tower in a Shanghai neighborhood that's modern, but considered a little bland.
February 18, 2013 A pretrial hearing in the Sept. 11 case was suspended briefly last week to investigate allegations of eavesdropping. The commissions' chief prosecutor launched an investigation, and said no one was "listening, monitoring, recording" the proceedings. Defense attorneys seemed to take his word, which given the history of the commissions, is a baby step toward progress.
February 17, 2013 To get the Distinguished Warfare Medal, no valor or bodily harm is necessary. But even safely away from combat, drone operators and cyber hackers can have a major impact on military operations. Until now, there hasn't been an award for those contributions.