Given at the end is an article. Analyze it and output in the following JSON format.
{
"analysis": {
"bias": {
"score": "1-10, where 1-10 measures UNFAIR or UNHELPFUL bias.
As the AI analyst, you must judge:
1. Fairness of Bias:
- Is the tone/alarm proportional to events?
- Is criticism warranted by facts?
- Are similar actions judged equally?
2. Utility of Bias:
- Does the bias help readers understand real implications?
- Does it highlight genuine concerns that neutral language might minimize?
- Does it provide valuable context through its perspective?
Example: An article about climate change might use emotional language
and scary scenarios. While this is technically 'bias', it might be
USEFUL bias if it helps readers grasp real dangers that cold, neutral
language would understate.
A high bias score should only be given when bias is both unfair AND unhelpful.",
"description": "Explain both unfair and useful bias found. For each biased element:
1. Is it fair/warranted?
2. Does it serve a valuable purpose for readers?
3. Should it be removed or retained?"
},
"missing_context_misinformation": {
"score": "1-10",
"points": [
"", # DIRECTLY provide essential context the reader needs without ANY phrases like "the article lacks/doesn't/fails to mention/omits" etc. Simply state the relevant facts. Each point up to 5 sentences as needed. Up to 10 points. NEVER refer to the article itself or what it's missing - just supply the information directly. The missing context should try to compensate for the bias in the article, and not just add related information.
]
},
"disinformation_lies": {
"score": "1-10",
"points": [
"" # Provide corrections for verifiably false statement. These lines should be brief. Upto 10 points.
# Use Wikipedia (via the search tool) to verify events and dates up through 2025-07-30. Any event dated ≤ 2025-07-30 should not be marked as disinformation if it matches Wikipedia. Only flag statements you can not verify or that Wikipedia contradicts as of 2025-07-30.”
]
}
},
"summary": [], # A list of 2 to 5 paragraphs. Provide a version that: * Retains key facts and proportional concerns, * Removes unfair bias while keeping warranted criticism, * Adds critical missing context, * Corrects any inaccuracies. Remove author attribution. Maintain article's POV - no meta-references. You can decide the most appropriate length based on the article.summary can be longer than the article if needed.
"title": "Provide an Appropriate Title Based on the Article's Content.",
"changes_made": [
"List significant changes made in the summary",
"Include both removals and additions",
"Note bias adjustments"
],
"key_words": [
"3-10 relevant terms to help identify related articles",
"Focus on major themes and topics"
],
"keywords_update": {
"keyword-to-add-or-update": "new summary or updated to replace the previous"
}
}
KEYWORDS UPDATE INSTRUCTIONS:
- We want to save new information from beyond your knowledge cutoff of Mar 2024.
- Information can come from the provided article or Wikipedia.
- Pick up to 3 keywords of highest importance to update with new information.
- If a keyword lacks a summary, write one from scratch.
- For each keyword, list one line per new fact (up to 50 sentences per keyword).
- Each fact must:
1. Be one or two sentences long.
2. End with 1-3 references in brackets, e.g. [apnews], [nytimes,wikipedia].
3. Immediately after the reference(s), append a hyphen and the date of the event or when the fact was reported, in ISO format:
`Statement. [source] - [YYYY-MM-DD]`
- If you update an existing keyword's source (e.g. [foxnews] → [apnews]), ensure the replacement is supported by an article.
- Ensure each keyword is specific enough that its new facts warrant inclusion.
<example>
ARTICLE TOPIC
Raiding of 100+ immigrants allegedly illegal alients and alleged members from the Venezuelan gang Tren de Aragua, MS-13, and the Hells Angels for deportation. Authorities also found drugs at the underground nightclub at a strip mall in Colorado Springs. President Donald Trump praised the raid, saying on TruthSocial it had targeted some of the worst people in the US, whom he alleged judges are reluctant to deport.
keywords worth updating:
tren-de-aragua (I am sure this gang has a big list of information, but this deportation will be worth a mention)
tren-de-aragua+deportation (a more specific keyword that can take more detail about this incident)
trump+illegal_deportation (add this to the list of illegal deportations conducted by trump administration)
colorado_springs (this is a unique event for this town. an update here will add some trivia.)
trump+immigration (a key fact worth mentioning about how trump is implementation his immigration policies)
keywords to not update:
trump (too broad. not one of top 50 facts related to trump.)
illegal_deportation (depending upon existing content, may be too crowded for this incident to be added)
colorado (too broad, unlikely to fit this event in top 50)
drug_raids (too broad, unlikely to fit this event in top 50)
</example>
<existing_keywords_summaries>
google+uk+data-access :
google+government-data-requests :
uk+tech-privacy-laws :
google+backdoor-access :
us-lawmakers+tech-privacy :
google+privacy-denials :
uk+us+data-sharing :
tech-companies+government-surveillance :
google+transparency-reports :
privacy+international-law :
google+uk+backdoor-denial :
tech-privacy+government-access :
google+data-access-claims :
google+uk+backdoor-denial :
tech-companies+government-surveillance :
google+privacy-denials :
</existing_keywords_summaries>
<wikipedia_requested_titles>
TITLE Google Search
Google Search or Google Web Search is a web search engine owned by Google Inc. and is the most-used search engine on the World Wide Web. Google receives several hundred million queries each day through its various services.
The main purpose of Google Search is to hunt for text in webpages, as opposed to other data, such as with Google Image Search. Google search was originally developed by Larry Page and Sergey Brin in 1997, based on earlier search-engine designs.
Google Search provides at least 22 special features beyond the original word-search capability. These include synonyms, weather forecasts, time zones, stock quotes, maps, earthquake data, movie showtimes, airports, home listings, and sports results. (see below: Special features). There are special features for numbers, including ranges (70..73), prices, temperatures, money/unit conversions ("10.5 cm in inches"), calculations ( 3*4+sqrt(6)-pi/2 ), package tracking, patents, area codes, and language translation of displayed pages.
The order of search results (ghits for Google hits) on Google's search-results pages is based, in part, on a priority rank called a "PageRank". Google Search provides many options for customized search (see below: Search options), using Boolean operators such as: exclusion ("-xx"), inclusion ("+xx"), alternatives ("xx OR yy"), and wildcard ("x * x").
== Search engine ==
=== PageRank ===
Google's rise to success was in large part due to a patented algorithm called PageRank that helps rank web pages that match a given search string.
Previous keyword-based methods of ranking search results, used by many search engines that were once more popular than Google, would rank pages by how often the search terms occurred in the page, or how strongly associated the search terms were within each resulting page.
The PageRank algorithm instead analyses human-generated links, assuming that web pages linked from many important pages are themselves likely to be important. The algorithm computes a recursive score for pages, based on the weighted sum of the PageRanks of the pages linking to them. PageRank is thought to correlate well with human concepts of importance.
In addition to PageRank, Google over the years has added many other secret criteria for determining the ranking of pages on result lists, reported to be over 200 different indicators. The details are kept secret due to spammers and in order to maintain an advantage over Google's competitors.
=== Search results ===
The exact percentage of the total of web pages that Google indexes is not known, as it is very hard to actually calculate.
Google not only indexes and caches web pages but also takes "snapshots" of other file types, which include PDF, Word documents, Excel spreadsheets, Flash SWF, plain text files, and so on. Except in the case of text and SWF files, the cached version is a conversion to (X)HTML, allowing those without the corresponding viewer application to read the file.
Users can customize the search engine, by setting a default language, using the "SafeSearch" filtering technology and set the number of results shown on each page. Google has been criticized for placing long-term cookies on users' machines to store these preferences, a tactic which also enables them to track a user's search terms and retain the data for more than a year. For any query, up to the first 1000 results can be shown with a maximum of 100 displayed per page. The ability to specify the number of results is available only if "Instant Search" is not enabled. If "Instant Search" is enabled, only 10 results are displayed, regardless of this setting.
=== Non-indexable data ===
Despite its immense index, there is also a considerable amount of data available in online databases which are accessible by means of queries but not by links. This so-called invisible or deep Web is minimally covered by Google and other search engines. The deep Web contains library catalogs, official legislative documents of governments, phone books, and other content which is dynamically prepared to respond to a query.
Privacy in some countries forbids the showing of some links. For instance in Switzerland any individual can force Google Inc. to delete a link which contains their name.
=== Google optimization ===
Since Google is the most popular search engine, many webmasters have become eager to influence their website's Google rankings. An industry of consultants has arisen to help websites increase their rankings on Google and on other search engines. This field, called search engine optimization, attempts to discern patterns in search engine listings, and then develop a methodology for improving rankings to draw more searchers to their client's sites.
Search engine optimization encompasses both "on page" factors (like body copy, title elements, H1 heading elements and image alt attribute values) and Off Page Optimization factors (like anchor text and PageRank). The general idea is to affect Google's relevance algorithm by incorporating the keywords being targeted in various places "on page", in particular the title element and the body copy (note: the higher up in the page, presumably the better its keyword prominence and thus the ranking). Too many occurrences of the keyword, however, cause the page to look suspect to Google's spam checking algorithms.
Google has published guidelines for website owners who would like to raise their rankings when using legitimate optimization consultants.
== Functionality ==
Google search consists of a series of localized websites. The largest of those, the google.com site, is the top most-visited website in the world. Some of its features include a definition link for most searches including dictionary words, the number of results you got on your search, links to other searches (e.g. for words that Google believes to be misspelled, it provides a link to the search results using its proposed spelling), and many more.
=== Search syntax ===
Google's search engine normally accepts queries as a simple text, and breaks up the user's text into a sequence of search terms, which will usually be words that are to occur in the results, but one can also use Boolean operators, such as: quotations marks (") for a phrase, a prefix such as "+", "-" for qualified terms, or one of several advanced operators, such as "site:". The webpages of "Google Search Basics" describe each of these additional queries and options (see below: Search options).
Google's Advanced Search web form gives several additional fields which may be used to qualify searches by such criteria as date of first retrieval. All advanced queries transform to regular queries, usually with additional qualified terms.
=== Query expansion ===
Google applies query expansion to the submitted search query, transforming it into the query that will actually be used to retrieve results. As with page ranking, the exact details of the algorithm Google uses are deliberately obscure, but certainly the following transformations are among those that occur:
Term reordering: in information retrieval this is a standard technique to reduce the work involved in retrieving results. This transformation is invisible to the user, since the results ordering uses the original query order to determine relevance.
Stemming is used to increase search quality by keeping small syntactic variants of search terms.
There is a limited facility to fix possible misspellings in queries.
=== "I'm Feeling Lucky" ===
Google's homepage includes a button labeled "I'm Feeling Lucky". When a user clicks on the button the user will be taken directly to the first search result, bypassing the search engine results page. The thought is that if a user is "feeling lucky", the search engine will return the perfect match the first time without having to page through the search results. According to a study by Tom Chavez of "Rapt", this feature costs Google $110 million a year as 1% of all searches use this feature and bypass all advertising.
On October 30, 2009, for some users, the "I'm Feeling Lucky" button was removed from Google's main page, along with the regular search button. Both buttons were replaced with a field that reads, "This space intentionally left blank." This text faded out when the mouse was moved on the page, and normal search functionality is achieved by filling in the search field with the desired terms and pressing enter. A Google spokesperson explains, "This is just a test, and a way for us to gauge whether our users will like an even simpler search interface." Personalized Google homepages retained both buttons and their normal functions.
On May 21, 2010, the 30th anniversary of Pac-Man, the "I'm Feeling Lucky" button was replaced with a button reading the words "Insert Coin". After pressing the button, the user would begin a Google-themed game of Pac-Man in the area where the Google logo would normally be. Pressing the button a second time would begin a two-player version of the same game that includes Ms. Pacman for player 2. This version can be accessed at http://www.google.com/pacman as a permanent link to the page.
=== Rich Snippets ===
On 12 May 2009, Google announced that they would be parsing the hCard, hReview, and hProduct microformats and using them to populate search result pages with what they called "Rich Snippets".
=== Special features ===
Besides the main search-engine feature of searching for text, Google Search has more than 22 "special features" (activated by entering any of dozens of trigger words) when searching:
weather – The weather conditions, temperature, wind, humidity, and forecast, for many cities, can be viewed by typing "weather" along with a city for larger cities or city and state, U.S. zip code, or city and country for smaller cities (such as: weather Lawrence, Kansas; weather Paris; weather Bremen, Germany).
stock quotes – The market data for a specific company or fund can be viewed, by typing the ticker symbol (or include "stock"), such as: CSCO; MSFT; IBM stock; F stock (lists Ford Motor Co.); or AIVSX (fund). Results show inter-day changes, or 5-year graph, etc. This does not work for stock names which are one letter long, such as Citigroup (C) or Macy's (M) (Ford being an exception), or are common words, such as Diamond Offshore (DO) or Majesco (COOL).
time – The current time in many cities (worldwide), can be viewed by typing "time" and the name of the city (such as: time Cairo; time Pratt, KS).
sports scores – The scores and schedules, for sports teams, can be displayed by typing the team name or league name into the search box.
unit conversion – Measurements can be converted, by entering each phrase, such as: 10.5 cm in inches; or 90 km in miles
currency conversion – A money or currency converter can be selected, by typing the names or currency codes (listed by ISO 4217): 6789 Euro in USD; 150 GBP in USD; 5000 Yen in USD; 5000 Yuan in lira (the U.S. dollar can be USD or "US$" or "$", while Canadian is CAD, etc.).
calculator – Calculation results can be determined, as calculated live, by entering a formula in numbers or words, such as: 6*77 +pi +sqrt(e^3)/888 plus 0.45. The user is given the option to search for the formula, after calculation. The calculator also uses the unit and currency conversion functions to allow unit-aware calculations. For example, "(3 EUR/liter) / (40 miles/gallon) in USD / mile" calculates the dollar cost per mile for a 40 mpg car with gas costing 3 euros a liter. The caret "^" raises a number to an exponent power, and percentages are allowed ("40% of 300").
numeric ranges – A set of numbers can be matched by using a double-dot between range numbers (70..73 or 90..100) to match any positive number in the range, inclusive. Negative numbers are treated as using exclusion-dash to not match the number.
dictionary lookup – A definition for a word or phrase can be found, by entering "define" followed by a colon and the word(s) to lookup (such as, "define:philosophy")
maps – Some related maps can be displayed, by typing in the name or U.S. ZIP code of a location and the word "map" (such as: New York map; Kansas map; or Paris map).
movie showtimes – Reviews or movie showtimes can be listed for any movies playing nearby, by typing "movies" or the name of any current movie into the search box. If a specific location was saved on a previous search, the top search result will display showtimes for nearby theaters for that movie. These listings however are sometimes totally incorrect and there is no way to ask Google to correct them; for example, on 25 July, for the El Capitan Theatre, google showtimes lists Up but according to the El Capitan website, the only movie playing that day is G-Force.
public data – Trends for population (or unemployment rates) can be found for U.S. states & counties, by typing "population" or "unemployment rate" followed by a state or county name.
real estate and housing – Home listings in a given area can be displayed, using the trigger words "housing", "home", or "real estate" followed by the name of a city or U.S. zip code.
travel data/airports – The flight status for arriving or departing U.S. flights can be displayed, by typing in the name of the airline and the flight number into the search box (such as: American airlines 18). Delays at a specific airport can also be viewed (by typing the name of the city or three-letter airport code plus word "airport").
package tracking – Package mail can be tracked by typing the tracking number of a Royal Mail, UPS, Fedex or USPS package directly into the search box. Results will include quick links to track the status of each shipment.
patent numbers – U.S. patents can be searched by entering the word "patent" followed by the patent number into the search box (such as: Patent 5123123).
area code – The geographical location (for any U.S. telephone area code) can be displayed by typing a 3-digit area code (such as: 650).
synonym search – A search can match words similar to those specified, by placing the tilde sign (~) immediately in front of a search term, such as: ~fast food.
U.S. Government search – Searching of U.S. government websites can be performed from webpage: www.google.com/unclesam.
=== Search options ===
The webpages maintained by the Google Help Center have text describing more than 15 various search options.
The Google operators:
OR – Search for either one, such as "price high OR low" searches for "price" with "high" or "low".
"-" – Search while excluding a word, such as "apple -tree" searches where word "tree" is not used.
"+" – Force inclusion of a word, such as "Name +of +the Game" to require the words "of" & "the" to appear on a matching page.
"*" – Wildcard operator to match any words between other specific words.
Some of the query options are as follows:
define: – The query prefix "define:" will provide a definition of the words listed after it.
stocks: – After "stocks:" the query terms are treated as stock ticker symbols for lookup.
site: – Restrict the results to those websites in the given domain, such as, site:www.acmeacme.com. The option "site:com" will search all domain URLs named with ".com" (no space after "site:").
allintitle: – Only the page titles are searched (not the remaining text on each webpage).
intitle: – Prefix to search in a webpage title, such as "intitle:google search" will list pages with word "google" in title, and word "search" anywhere (no space after "intitle:").
allinurl: – Only the page URL address lines are searched (not the text inside each webpage).
inurl: – Prefix for each word to be found in the URL; others words are matched anywhere, such as "inurl:acme search" matches "acme" in a URL, but matches "search" anywhere (no space after "inurl:").
The page-display options (or query types) are:
cache: – Highlights the search-words within the cached document, such as "cache:www.google.com xxx" shows cached content with word "xxx" highlighted.
link: – The prefix "link:" will list webpages that have links to the specified webpage, such as "link:www.google.com" lists webpages linking to the Google homepage.
related: – The prefix "related:" will list webpages that are "similar" to a specified web page.
info: – The prefix "info:" will display some background information about one specified webpage, such as, info:www.google.com. Typically, the info is the first text (160 bytes, about 23 words) contained in the page, displayed in the style of a results entry (for just the 1 page as matching the search).
filetype: - results will only show files of the desired type (ex filetype:pdf will return pdf files)
Note that Google searches the HTML coding inside a webpage, not the screen appearance: the words displayed on a screen might not be listed in the same order in the HTML coding.
=== Error messages ===
Some searches will give a 403 Forbidden error with the text
"We're sorry...
... but your query looks similar to automated requests from a computer virus or spyware application. To protect our users, we can't process your request right now.
We'll restore your access as quickly as possible, so try again soon. In the meantime, if you suspect that your computer or network has been infected, you might want to run a virus checker or spyware remover to make sure that your systems are free of viruses and other spurious software.
We apologise for the inconvenience, and hope we'll see you again from all of the team here at Google."
sometimes followed by a CAPTCHA prompt.
The screen was first reported in 2005, and was a response to the heavy use of Google by search engine optimization companies to check on ranks of sites they were optimizing. The message is triggered by high volumes of requests from a single IP address. Google apparently uses the Google cookie as part of its determination of refusing service.
In June 2009, after the death of pop superstar Michael Jackson, this message appeared to many internet users who were searching Google for news stories related to the singer, and was assumed by Google to be a DDoS attack, although many queries were submitted by legitimate searchers.
==== January 2009 malware bug ====
Google flags search results with the message "This site may harm your computer" if the site is known to install malicious software in the background or otherwise surreptitiously. Google does this to protect users against visiting sites that could harm their computers. For approximately 40 minutes on January 31, 2009, all search results were mistakenly classified as malware and could therefore not be clicked; instead a warning message was displayed and the user was required to enter the requested URL manually. The bug was caused by human error. The URL of "/" (which expands to all URLs) was mistakenly added to the malware patterns file.
=== Doodle for Google ===
On certain occasions, the logo on Google's webpage will change to a special version, known as a "Google Doodle". Clicking on the Doodle links to a string of Google search results about the topic. The first was a reference to the Burning Man Festival in 1998, and others have been produced for the birthdays of notable people like Albert Einstein, historical events like the interlocking Lego block's 50th anniversary and holidays like Valentine's Day.
=== Google Caffeine ===
In August 2009, Google announced the rollout of a new search architecture, codenamed "Caffeine".
The new architecture was designed to return results faster and to better deal with rapidly updated information from services including Facebook and Twitter.
Google developers noted that most users would notice little immediate change, but invited developers to test the new search in its sandbox.
Differences noted for their impact upon search engine optimization included heavier keyword weighting and the importance of the domain's age.
The move was interpreted in some quarters as a response to Microsoft's recent release of an upgraded version of its own search service, renamed Bing.
Google announced completion of Caffeine on 8 June 2010, claiming 50% fresher results due to continuous updating of its index.
With Caffeine, Google moved its back-end indexing system away from MapReduce and onto BigTable, the company's distributed database platform. Caffeine is also based on Colossus, or GFS2, an overhaul of the GFS distributed file system.
=== Encrypted Search ===
In May 2010 Google rolled out SSL-encrypted web search. The encrypted search can be accessed at: https://encrypted.google.com Archived 2013-12-15 at the Wayback Machine
=== Instant Search ===
Google Instant, an enhancement that displays suggested results while the user types, was introduced in the United States starting on September 8, 2010. One concern is that people might select one of the suggested results instead of finishing their request, and that such a practice could cause bias toward familiar businesses or other search terms. Pornographic or otherwise offensive search terms are excluded from the suggested results. The instant feature appears only on the basic Google site and not specialized iGoogle pages. Google expects Google Instant to save users 2 to 5 seconds in every search, which they say will be collectively 11 million seconds per hour. Search engine marketing pundits speculated that Google Instant would have a great impact on local and paid search.
In concert with the Google Instant launch, Google disabled the ability of users to choose to see more than 10 search results per page. Instant Search can be disabled via Google's "preferences" menu, but autocomplete-style search suggestions now cannot be disabled. A Google representative stated, "It's in keeping with our vision of a unified Google search experience to make popular, useful features part of the default experience, rather than maintain different versions of Google. As Autocomplete quality has improved, we felt it was appropriate to have it always on for all of our users."
== International ==
Google is available in many languages and has been localized for many countries.
=== Languages ===
The interface has also been made available in some languages for humorous purpose:
Elmer Fudd
Hacker
Klingon
Pig Latin
=== Domain names ===
In addition to the main URL Google.com, Google Inc. owns 160 domain names for each of the countries/regions in which it has been localized. As Google is an American company, the main domain name can be considered as the U.S. one.
Some domain names unregistered by Google are currently squatted, such as "Google.ua" (for Ukraine, where the correct URL is "google.com.ua").
== Search products ==
In addition to its tool for searching webpages, Google also provides services for searching images, Usenet newsgroups, news websites, videos, searching by locality, maps, and items for sale online. In 2006, Google has indexed over 25 billion web pages, 400 million queries per day, 1.3 billion images, and over one billion Usenet messages. It also caches much of the content that it indexes. Google operates other tools and services including Google News, Google Suggest, Google Product Search, Google Maps, Google Co-op, Google Earth, Google Docs, Picasa, Panoramio, YouTube, Google Translate, Google Blog Search and Google Desktop Search.
There are also products available from Google that are not directly search-related. Gmail, for example, is a webmail application, but still includes search features; Google Browser Sync does not offer any search facilities, although it aims to organize your browsing time.
Also Google starts many new beta products, like Google Social Search or Google Image Swirl.
In 2017 the USPTO issued Microsoft a patent describing a methodology that could serve as an alternative to Google's Instant Search.
== Energy consumption ==
Google claims that a search query requires altogether about 1 kJ or 0.0003 kW·h.
== Related pages ==
List of Google products
List of search engines
== References ==
== Further reading ==
Google Hacks from O'Reilly is a book containing tips about using Google effectively. Now in its third edition. ISBN 978-0-596-52706-8.
Google: The Missing Manual by Sarah Milstein and Rael Dornfest (O'Reilly, 2004). ISBN 978-0-596-00613-6
How to Do Everything with Google by Fritz Schneider, Nancy Blachman, and Eric Fredricksen (McGraw-Hill Osborne Media, 2003). ISBN 978-0-07-223174-8
Google Power by Chris Sherman (McGraw-Hill Osborne Media, 2005). ISBN 978-0-07-225787-8
Barroso, Luiz Andre; Dean, Jeffrey and Hölzle, Urs (2003). "Web Search for a Planet: The Google Cluster Architecture". IEEE Micro. 23 (2): 22–28. doi:10.1109/MM.2003.1196112.{{cite journal}}: CS1 maint: multiple names: authors list (link)
== Other websites ==
Official website
The Original Google!
Google search trends
TITLE Freedom of information
Freedom of information is the right to freedom of expression on the Internet and other information technology. Freedom of information is the ability to access the Web without censorship or restrictions.
Freedom of information is a human right recognised in international law. Freedom of speech includes not only the text and pictures but also the means of expression. Freedom of information may also refer to the right to privacy in the context of the Internet and information technology. The right to privacy is a human right and freedom of information is an extension of this right.
== Related pages ==
Digital rights
Free content
Freenet
== References ==
TITLE Privacy by design
Privacy by design (PbD) is an idea in systems engineering and information technology.
In privacy by design, the engineers build the system so that it keeps information private starting at the beginning instead of building the system and then adding privacy protection later. In privacy by design, the designers treat privacy protection as just as important as other parts of the design.
== History ==
Dr. Ann Cavoukian first said the term "Privacy by Design" when she was the Information and Privacy Commissioner of Ontario, Canada. Dr. Cavoukian later wrote about the "7 foundational principles" of privacy by design in the 1990s.
The European GDPR regulation incorporates privacy by design which revolves around the following foundational principles:
== Foundational principles ==
=== Privacy by Design is based on seven foundational principles ===
Privacy First
Privacy as the default setting
Privacy inside of design
Full functionality
End-to-end security
Keep it open
Keep user centered
The authors of more than five hundred other articles have talked about these principles by citing the white paper "Privacy by Design in Law, Policy and Practice" by Ann Cavoukian. Privacy by Design is accepted as the gold standard internationally.
== References ==
TITLE Classified information
Classified information is sensitive information to which access is restricted by law or regulation to particular classes of people. A formal security clearance is required to handle classified documents or access classified data. The clearance process requires a satisfactory background investigation. There are usually several levels of sensitivity, with differing clearance requirements. This sort of hierarchical system of sharing information among a group of people is used by most national governments. Deciding the level of sensitivity of data is called data classification.
The purpose of classification is to protect information from being used to damage or cause danger to national security. Classification says what is a "state secret" and deals with different levels of protection based on the damage the information might cause if it reached the wrong hands.
Some non-government organizations and corporations also have their own secret information, normally referred to as trade secrets.
== Classification levels ==
Although the classification systems vary from country to country, most have levels like the following British definitions (from the highest level to lowest):
Top Secret (TS)
The highest level of classification of material on a national level. Such material would cause "exceptionally grave damage" to national security if publicly available.
Secret
Such material would cause "serious damage" to national security if publicly available.
Confidential
Such material would cause "damage" or be "prejudicial" to national security if publicly available.
Restricted
Such material would cause "undesirable effects" if publicly available.
Depending on the level of classification there are different rules controlling the level of clearance needed to view the information, and how it must be stored, transmitted, and destroyed. Access is restricted on a "need to know" basis. Simply possessing a clearance does not automatically authorize the individual to view all material classified at that level or below that level. The individual must have a "need to know" in addition to the proper level of clearance.
== Other websites and references ==
US "NISPOM" manual, explaining rules on classified information among other things - full title is "National Industrial Security Program Operating Manual".
Marking Classified National Security Information ISOO booklet PDF
Trusted operating systems
Defense Business Services National Security Vetting (DBS NSV). Carries out national security checks in the UK.
Los Alamos table of equivalent US and UK classifications Archived 2012-05-10 at the Wayback Machine
The National Security Archive - a collection of declassified documents acquired through the FOIA
Lerner, Brenda Wilmoth & K. Lee Lerner, eds. Terrorism : essential primary sources. Thomson Gale, 2006. ISBN 9781414406213 Library of Congress. Jefferson or Adams Bldg General or Area Studies Reading Rms LC Control Number: 2005024002.
Peter Galison, Removing Knowledge in Critical Inquiry n°31 (Autumn 2004)
RADNA GRUPA ZA IZRADU ZAKONA O TAJNIM INFORMACIJAMA, proposition of Serbian non government working group for Classification of secrets law, .DOC Serbian
TITLE International Covenant on Civil and Political Rights
The International Covenant on Civil and Political Rights is a treaty made by the United Nations. It is to help civil rights get better.
The rights are listed in the Universal Declaration of Human Rights. It is one of the most important treaties in international human rights law. The Covenant was adopted on 16 December 1966 with the International Covenant on Economic, Social and Cultural Rights. It was put into force in 1976. The United Nations set up the Committee on Civil and Political Rights (CCPR) to carry out the treaty.
== Main contents ==
Article 1. Right to self-determination.
Article 6. Right to life and on Genocide Convention.
Article 7. Free from torture and any inhuman treatments.
Article 8. Free from slavery and unfree labour.
Article 9. Right to personal security and protection from arbitrary arrest and detention. Right to demand remedy if proved innocent.
Article 10. The right to be treated with humanity and repected dignity while in detention.
Article 12. Freedom of movement, freedom to leave and to enter one's own country.
Article 14. The right to a fair trial and to be regarded as innocent until found guilty.
Article 16. Right to be recognized as a person before law.
Article 17. Right to privacy and protection from attack of honour.
Article 18. Freedom of thought, conscience and freedom of religion.
Article 19. Freedom of expression and freedom of speech but with special duty and responsibility not to harm others.
Article 20. prohibition of propaganda of war and any inciting of hatred and discrimination.
Article 21. Freedom of assembly.
Article 22. Right to association and trade union.
Article 23. Right to family and marriage with free will of each person (against forced marriage).
Article 25. Right to free and fair voting.
Article 26. Equality before law and protection from all discriminations by law.
Article 27. Right to minority groups and ethnic group and to use their own language.
== Optional protocols ==
This Covenant has two optional protocols. One of them is to allow a citizen whose rights have been violated to claim before the CCPR. The other is to prohibit the death penalty. There are countries which ignore, or do not agree with, the optional protocols.
== Related pages ==
Civil and political rights
Civil rights
International human rights law
Universal Declaration of Human Rights
Human rights
== Other websites ==
International Covenant on Civil and political Rights
== References ==
TITLE List of security hacking incidents
This is a list of security hacking incidents.
== 1970s ==
=== 1971 ===
A Vietnam War veteran named John Draper discovers that the give-away whistle in Cap'n Crunch cereal boxes perfectly reproduces a 2600 hertz tone. Draper builds a "blue box" that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Shortly afterwards, Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box, and wire fraud in the United States escalates.
=== 1978 ===
Susan Thunder is one of the early "phone phreakers," part of Kevin Mitnick’s crew who break into phone lines.
== 1980s ==
=== 1982 ===
1982 — In Milwaukee a group of six teenagers hackers calling themselves the 414's (their area code) break into some 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan-Kettering Cancer Center before being arrested.
=== 1984 ===
CULT OF THE DEAD COW forms in Lubbock, Texas and begins publishing its ezine.
=== 1988 ===
The Morris Worm: Robert T. Morris, Jr. (RTM), a graduate student at Cornell University and son of a chief scientist at a division of the National Security Agency, launches a self-replicating worm on the government's ARPAnet (precursor to the Internet) to test its effect on UNIX systems. The worm gets out of hand and spreads to some 6000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years' probation, and fined $10,000.
Kevin Mitnick secretly monitors the e-mail of MCI Communications and Digital Equipment Corporation (DEC) security officials. Kevin Mitnick is convicted of violating computer network of DEC and sentenced to a year in jail.
Kevin Poulsen — was indicted on phone-tampering charges. Kevin went on the run and avoided capture for 17 months.
First National Bank of Chicago is the victim of $70-million computer theft.
=== 1989 ===
The Germans and the KGB: In the first cyberespionage case to make international headlines, hackers in West Germany (loosely affiliated with the Chaos Computer Club) are arrested for breaking into U.S. government and corporate computers and selling operating-system source code to the Soviet KGB. Three of them are turned in by two fellow hacker spies, and a fourth suspected hacker commits suicide when his possible role in the plan is publicized. Because the information stolen is not classified, the hackers are fined and sentenced to probation. In a separate incident,
Arrest of a hacker who calls himself The Mentor. He publishes a now-famous treatise that comes to be known as the Hacker's Manifesto.
Fry Guy is raided by law enforcement; police hunt for Legion of Doom hackers.
Jude Milhon (aka St Jude) and R. U. Sirius launch Mondo 2000, a major '90s tech-lifestyle magazine, in Berkeley, California.
== 1990s ==
=== 1990 ===
LOD and MOD engaged in almost two years of online warfare — jamming phone lines, monitoring calls, trespassing in each other's private computers. Then the Feds cracked down. For Phiber and friends, that meant jail.
=== 1991 ===
Rumors circulate about the "Michelangelo" virus, expected to crash computers on March 6, 1992, the artist's 517th birthday. Doomsday passes without incident.
Kevin Poulsen is captured and indicted for stealing military documents.
resulted in jail sentences for four members of the Masters of Deception. Phiber Optik spent a year in federal prison.
=== 1992 ===
Hackers break into GAFB, NASA and KARI.
=== 1993 ===
During radio station call-in contests, hacker-fugitive Kevin Poulsen and two friends rig the stations' phone systems to let only their calls through, and "win" two Porsches, vacation trips, and $20,000. Poulsen, already wanted for breaking into phone-company systems, serves five years in prison for computer and wire fraud.
Texas A&M University professor receives death threats because a hacker used his computer to send 20,000 racist e-mails.
=== 1994 ===
Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
Hackers adapt to emergence of the World Wide Web quickly, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.
=== 1995 ===
February: Kevin Mitnick was arrested again. This time the FBI accused him of stealing 20,000 credit card numbers. Kevin Mitnick is incarcerated on charges of "wire fraud and illegal possession of computer files stolen from such companies as Motorola and Sun Microsystems" He is held in prison for four years without a trial.
United States Department of Defense computers sustained 250,000 attacks by hackers.
Hackers deface federal web sites.
=== 1996 ===
Hackers alter Web sites of the United States Department of Justice (August), the CIA (October), and the U.S. Air Force (December).
Canadian hacker group, Brotherhood, breaks into the Canadian Broadcasting Corporation.
The U.S. General Accounting Office reports that hackers attempted to break into Defense Department computer files some 250,000 times in 1995 alone. About 65 percent of the attempts were successful, according to the report.
The MP3 format gains popularity in the hacker world. Many hackers begin setting up sharing sites via FTP, Hotline, IRC and USEnet.
=== 1997 ===
AOHell is released, a freeware application that allows a burgeoning community of unskilled script kiddies to wreak havoc on America Online. For days, hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs and their chat rooms disrupted with spam messages.
A 15-year-old Croatian youth penetrates computers at a U.S. Air Force base in Guam.
Hackers get into Microsoft's Windows NT operating system.
=== 1998 ===
January: Yahoo! notifies Internet users that anyone visiting its site in recent weeks might have downloaded a logic bomb and worm planted by hackers claiming a "logic bomb" will go off if Mitnick is not released from prison.
During heightened tensions in the Persian Gulf, hackers touch off a string of break-ins Solar Sunrise, a series of attacks targeting unclassified Pentagon computers and steal software programs, leads to the establishment of round-the-clock, online guard duty at major military computer sites. Then-U.S. Deputy Defense Secretary John Hamre calls it "the most organized and systematic attack" on U.S. military systems to date. An investigation points to two American teens. A 19-year-old Israeli hacker who calls himself The Analyzer (aka Ehud Tenebaum) is eventually identified as their ringleader and arrested. Tenebaum is later made chief technology officer of a computer consulting firm.
March: Timothy Lloyd is indicted for planting a logic bomb on the network of Omega Engineering. The logic bomb causes millions in damage.
Hackers alter The New York Times Web site, renaming it HFG (Hacking for Girlies). The hackers express anger at the arrest and imprisonment of Kevin Mitnick, the subject of the book "Takedown" co-authored by Times reporter John Markoff.
Two hackers are sentenced to death by a court in China for breaking into a bank computer network and stealing 260,000 yuan ($31,400).
July: Hackers break into United Nations Children Fund Web site threathening "holocaust."
August: The hacking group CULT OF THE DEAD COW releases its Trojan horse program, Back Orifice at DEF CON. Once a user installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
December: L0pht testifies to the senate that it could shut down nationwide access to the Internet in less than 30 minutes.
=== 1999 ===
The Electronic Civil Disobedience project, an online political performance-art group, attacks the Pentagon calling it conceptual art. It said it was protesting U.S. support of the Mexican suppression of rebels in southern Mexico. Carmin Karasic, helped write FloodNet, the tool used by ECD to bombard its opponents with access requests in a symbolic, harmless version of the denial-of-service attacks that took down CNN and Yahoo.
Classified computer systems at Kelly Air Force Base in San Antonio, Texas, come under attack from a number of locations around the world, but the attacks were detected and stopped by newly developed Defense Department systems.
U.S. Information Agency Web site is hacked for the second time in six months. The hacker circumvented the agency's Internet security and damaged the hard drive, leaving behind the message "Crystal, I love you" and the signature "Zyklon."
March: The Melissa worm is released and quickly becomes the most costly malware outbreak to date.
July: CULT OF THE DEAD COW releases Back Orifice 2000 at DEF CON
September: Level Seven hacks and places racist, anti-government slogans on embassy site in regards to 1998 U.S. embassy bombings
"Unidentified hackers seized control of a British military communication satellite and demanded money in return for control of the satellite.
December 29: the Legions of the Underground (LoU) declared cyberwar on Iraq and China with the intention of disrupting and disabling internet infrastructure.
== 2000s ==
=== 2000 ===
January 7: an international coalition of hackers (including CULT OF THE DEAD COW, 2600 's staff, Phrack's staff, L0pht, and the Chaos Computer Club) issued a joint statement ([1]) condemning the LoU's declaration of war. The LoU responded by withdrawing its declaration.
January — A Russian cracker attempts to extort $100,000 from online music retailer CD Universe, threatening to expose thousands of customers' credit card numbers. Posting them on a website after the attempt to extort money from the company failed. Barry Schlossberg (AKA Lou Cipher) is successful at extoring 1.4M from CD Universe for "services rendered", in an attempt to "catch the russian hacker".
Second week of February — Canadian hacker MafiaBoy In the first and one of the biggest denial-of-service attacks to date, launches successful distributed denial-of-service (DDoS) attack taking down several high-profile Web sites, including Amazon, CNN and Yahoo!.
Activists in Pakistan and the Middle East deface Web sites belonging to the Indian and Israeli governments to protest oppression in Kashmir and Palestine.
Hackers break into Microsoft's corporate network and access source code for the latest versions of Microsoft Windows and Microsoft Office software. It is later released to several filesharing networks. The Register splashes with the immortal (and suppositional) headline: 'M$ hacked! Russian Mafia swipes WinME source'.
The following sites were attacked by hackers using distributed denial of service: Yahoo!, eBay, CNN.com, Amazon.com, Buy.com, ZDNet, E*Trade, and Datek.
March — President Clinton says he doesn't use e-mail to communicate with his daughter, Chelsea Clinton, at college because he doesn't think the medium is secure.
April — The U.S. Department of Justice unveils a portal that notes the government's position on Internet security and privacy issues, tracks prosecution of cybercriminals and provides guidelines for cybercrime investigations.
May — a new virus appeared that spread rapidly around the globe. The "I Love You" virus infected image and sound files and spread quickly by causing copies of itself to be sent to all individuals in an address book.
May — The LoveLetter virus sweeps across the globe in hours, wreaking havoc on networks and causing millions in damage and lost productivity.
June — President Clinton signs the "Electronic Signatures in Global and National Commerce" (E-Sign) into law, making digital signatures legally binding.
June — The Honeynet Project, led by Lance Spitzner, launches, collecting hacking intelligence through a network of decoy servers.
July — The SANS Institute releases its first "Top 10 Vulnerabilities" list, denoting the most prevalent problems exploited by hackers.
A 19-year-old Midwestern law student who calls herself ViXen900 is a member of the HNC hackers’ group and advises them on legal issues.
Kevin Mitnick is released from prison.
=== 2006 ===
January: One of the few worms to take after the old form of malware, destruction of data rather than the accumulation of zombie networks to launch attacks from, is discovered. It had various names, including Kama Sutra (used by most media reports), Black Worm, Mywife, Blackmal, Nyxem version D, Kapser, KillAV, Grew and CME-24. The worm would spread through e-mail client address books, and would search for documents and fill them with garbage, instead of deleting them to confuse the user. It would also hit a web page counter when it took control, allowing the programmer who created it as well as the world to track the progress of the worm. It would replace documents with random garbage on the third of every month. It was hyped by the media but actually affected relatively few computers, and was not a real threat for most users.
February: Direct-to-video film The Net 2.0 is released, as a sequel to The Net, following the same plotline, but with updated technology used in the film, using different characters, and different complications. The director of The Net 2.0, Charles Winkler, is son of Irwin Winkler, the director of The Net.
May: Jeanson James Ancheta receives a 57 month prison sentence, [2] Archived 2007-09-27 at the Wayback Machine and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment [3] Archived 2007-09-27 at the Wayback Machine.
May: Largest Defacement in Web History is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot. [4]
July: Robert Moore and Edwin Pena featured on Americas Most Wanted with Kevin Mitnick presenting their case commit the first VOIP crime ever seen in the USA. Robert Moore served 2 years in federal prison with a $152,000.00 restitution while Edwin Pena was sentenced to 10 years and a $1 million restitution.
September: Viodentia releases FairUse4WM tool which would remove DRM information off WMA music downloaded from music services such as Yahoo Unlimited, Napster, Rhapsody Music and Urge.
=== 2007 ===
May 17: Estonia recovers from massive denial-of-service attack
June 13: FBI Operation Bot Roast finds over 1 million botnet victims
June 21: A spear phishing incident at the Office of the Secretary of Defense steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD.
August 11: United Nations website hacked by Turkish Hacker Kerem125
October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)
November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments
=== 2008 ===
January 18: Project Chanology Anonymous attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet
March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including The Pentagon. They operate from a bare apartment on a Chinese island.
=== 2009 ===
April 1: Conficker worm infiltrated millions of PCs worldwide including many government-level top-security computer networks
=== 2001 ===
Microsoft becomes the prominent victim of a new type of crack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
February — A Dutch cracker releases the Anna Kournikova virus, initiating a wave of viruses that tempts users to open the infected attachment by promising a sexy picture of the Russian tennis star.
March — FBI agent Robert P. Hanssen is charged with using his computer skills and FBI access to spy for the Russians.
March — The L10n worm is discovered in the wild attacking older versions of BIND DNS.
April — FBI agents trick two Russian crackers into coming to the U.S. and revealing how they were cracking U.S. banks.
May
Spurred by elevated tensions in Sino-American diplomatic relations, U.S. and Chinese hackers engage in skirmishes of Web defacements that many dub "The Sixth Cyberwar".
Crackers begin using "pulsing" zombies, a new DDoS method that has zombie machines send random pings to targets rather than flooding them, making it hard to stop attacks.
AV experts identify Sadmind, a new cross-platform worm that uses compromised Sun Solaris boxes to attack Windows NT servers.
July — Russian programmer Dmitry Sklyarov is arrested at the annual Def Con hacker convention. He is the first person criminally charged with violating the Digital Millennium Copyright Act (DMCA).
August — Code Red, the first polymorphic worm, infects tens of thousands of machines.
September — The World Trade Center and Pentagon terrorist attacks spark lawmakers to pass a barrage of anti terrorism laws many of which group Hackers as terrorists and remove many long standing personal freedoms in the name of safety.
September — Nimda, a new memory-only worm, wreaks havoc on the Internet, quickly eclipsing Code Red's infection rate and recovery cost.
November — Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
November — The European Union adopts the controversial cybercrime treaty, which makes the possession and use of hacking tools illegal.
=== 2002 ===
January — Bill Gates decrees that Microsoft will secure its products and services, and kicks off a massive internal training and quality control campaign.
February — As part of its Trustworthy Computing initiative, Microsoft shuts down all Windows development, sending more than 8,000 programmers to security training.
April — The U.S. Army initiates the "Mannheim Project," an effort to better consolidate and secure the military's IT assets from cyber-warfare.
May — Klez.H, a variant of the worm discovered in November 2001, becomes the biggest malware outbreak in terms of machines infected, but causes little monetary damage.
June — The Bush administration files a bill to create the Department of Homeland Security, which, among other things, will be responsible for protecting the nation's critical IT infrastructure.
July — An Information Security survey finds that most security practitioners favor full disclosure because it helps them defend against hacker exploits and puts pressure of software vendors to improve their products.
August — Researcher Chris Paget publishes "shatter attacks," detailing how Windows' unauthenticated messaging system can be used to take over a machine. The paper raises questions about how securable Windows could ever be.
September — The White House's Office of Homeland Security releases a draft of the "National Strategy to Secure Cyberspace," which many criticize as being too weak.
October — The International Information Systems Security Certification Consortium--(ISC)2--confers its 10,000th CISSP certification.
=== 2003 ===
January 23 — Pittsburgh, Pennsylvania Man Convicted of Hacking a Judge's Personal E-Mail Account
February 6 — Former Employee of Viewsonic Arrested on Charges of Hacking into Company's Computer, Destroying Data.
February 13 — Ohio Man Attacked NASA Computer System Shutting Down Email Server.
February 20 — Ex-employee of Airport Transportation Company Arrested for Allegedly Hacking Into Computer, Destroying Data.
February 26 — U.S. Convicts Kazakhstan Cracker of Breaking into Bloomberg L.P.'s Computers and Attempting Extortion
February 26 — Former Employee of American Eagle Outfitters Indicted on Charges of Password Trafficking and Computer Damage.
February 28 — Los Angeles, California Man Sentenced to Prison for Role in International Computer Hacking and Internet Fraud Scheme.
March — CULT OF THE DEAD COW and Hacktivismo are given permission by the United States Department of Commerce to export software utilizing strong encryption
March 10 — California Woman Convicted for Unauthorized Computer Access to Customer Account Information in Credit Union Fraud Prosecution.
March 13 — Computer Cracker Ples Guilty to Computer Intrusion and Credit Card Fraud.
March 13 — St. Joseph, Missouri Man Pleas Guilty in District's First Computer Cracking Conviction.
March 14 — Student Charged with Unauthorized Access to University of Texas Computer System.
April 2 — San Jose, California Man Indicted for Theft of Trade Secrets and Computer Fraud.
April 18 — Ex-employee of Airport Transportation Company Guilty of Hacking into Company's Computer.
May 12 — Three Californians Indicted in Conspiracy to Commit Bank fraud and Identity Theft.
June 12 — Computer Hacker Sentenced to One Year and One Day And Ordered to Pay More than $88,000 Restitution For Series of Computer Intrusions and Credit Card Fraud.
June 12 — Southern California Man Who Hijacked Al Jazeera Website Agrees to Plead Guilty to Federal Charges.
July 1 — Kazakhstan Hacker Sentenced to Four Years Prison for Breaking into Bloomberg Systems and Attempting Extortion
July 11 — Queens, New York Man Pleads to Federal Charges of Computer Damage, Access Device Fraud and Software Piracy
July 17 — FBI Employee Arrested and Charged in Three Federal indictments
July 25 — Russian Man Sentenced for Cracking into Computers in the United States
August 23 — Jesus Oquendo "sil" of AntiOffline releases "BRAT Archived 2008-07-25 at the Wayback Machine" Border Router Attack Tool as part of "Theories in Denials of Service in an effort to make administrators aware of the possibility of a worm attack tool capable of breaking backbone routes on the Internet
August 25 — Former Computer Technician in Douglasville, Georgia Arrested for Hacking into Government Computer Systems in Southern California
August 29 — Minneapolis, Minnesota 18 year old Arrested for Developing and Releasing B Variant of Blaster Computer Worm.
September 9 — U.S. Charges Cracker with Illegally Accessing New York Times Computer Network.
September 10 — Deputy Assistant Attorney General John G. Malcolm's Testimony before the United States House of Representatives Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census.
September 26 — Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft.
September 29 — President of San Diego Computer Security Company Indicted in Conspiracy to Gain Unauthorized Access into Government Computers.
October 6 — Former Employee of Viewsonic Pleas Guilty to Hacking into Company's Computer, Destroying Data
October 7 — Disgruntled Philadelphia Phillies Fan Charged with Hacking into Computers Triggering spam E-mail Attacks.
November 5 — Dallas, Texas FBI Employee Indicted for Public corruption.
November 20 — Three Men Indicted for Hacking into Lowe's Companies' Computers with Intent to Steal Credit Card Information.
November 20 — Two Alleged Computer Hackers Charged in Los Angeles as Part of Nationwide 'Operation Cyber Sweep'.
December 5 — Former Hellmann Logistics Computer Programmer Sentenced for Unauthorized Computer Intrusion.
December 18 — Milford Man pleas guilty to hacking.
=== 2004 ===
March - Myron Tereshchuk arrested for attempting to extort $17 million from Micropatent. FBI agents find explosives and biological weapons in the course of the raid.
December — Brian Salcedo sentenced to 9 years in prison for his involvement in hacking into the corporate systems of Lowe's home improvement stores and attempting to steal customer credit card information. The sentence far exceeds the 5 1/2 years that hacker Kevin Mitnick spent behind bars. Prosecutors said the three men tapped into the wireless network of a Lowe's store in Southfield, Mich., used that connection to enter the chain's central computer system in North Wilkesboro, N.C., and installed a program to capture credit card information. No data was actually collected however.
July 13 - Informationleak.com is born and encompasses the ideals held by many of the groups from the so called golden age of hacking.
=== 2005 ===
September 15 - An unnamed teenager is sentenced to 11 months for gaining access to T-Mobile USA's network and exploiting Paris Hilton's sidekick, it turns out this teen is also responsable for breaking in to data broker LexisNexus's system in January.
November 4 - Jeanson James Ancheta, who prosecutors say was a member of the "Botmaster Underground", a group of script kiddies who are mostly noted for their excessive use of bot attacks and propogating vast amounts of spam on the internet, was taken into custody after being lured to FBI offices in Los Angeles.
== 2010s ==
=== 2010 ===
January 12: Operation Aurora Google publicly reveals that it has been on the receiving end of a "highly sophisticted and targetted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google"
June: Stuxnet The Stuxnet worm is found by VirusBlokAda. Stuxnet affects Windows computers throughout the world. Later, it is learned that Stuxnet can also affect some Unix systems.
=== 2011 ===
The hacker group Lulz Security is formed.
April 9: Bank of America website got hacked by a Turkish hacker named JeOPaRDY. An estimated 85,000 credit card numbers and accounts were reported to have been stolen due to the hack. Bank officials say no personal customer bank information is available on that web-page. Investigations are being conducted by the FBI to trace down the incriminated hacker.
April 17: An "external intrusion" sends the PlayStation Network offline, and compromises personally identifying information (possibly including credit card details) of its 77 million accounts, in what is claimed to be one of the five largest data breaches ever.
Computer hacker sl1nk releases information of his penetration in the servers of the Department of Defense (DoD), Pentagon, NASA, NSA, US Military, Department of the Navy, Space and Naval Warfare System Command and other UK/US government websites.
September: Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot.
October 16: The YouTube channel of Sesame Street was hacked, streaming pornographic content for about 22 minutes.
November 1: The main phone and Internet networks of the Palestinian territories sustained a hacker attack from multiple locations worldwide.
November 7: The forums for Valve's Steam service were hacked. Redirects for a hacking website, Fkn0wned, appeared on the Steam users' forums, offering "hacking tutorials and tools, porn, free giveaways and much more."
December 14: Five members of the Norwegian hacker group, Noria, were arrested, allegedly suspected for hacking into the email account of the militant extremist Anders Behring Breivik (who perpetrated the 2011 attacks in the country).
=== 2012 ===
A Saudi hacker, 0XOMAR, published over 400,000 credit cards online, and threatened Israel to release 1 million credit cards in the future. In response to that incident, an Israeli hacker published over 200 Saudi's credit cards online.
January 7: "Team Appunity", a group of Norwegian hackers, were arrested for breaking into Norway's largest prostitution website then publishing the user database online.
February 3: Marriott was hacked by a New Age ideologist, Attila Nemeth who was resisting against the New World Order where he said that corporations are allegedly controlling the world. As a response Marriott reported him to the United States Secret Service.
February 8: Foxconn is hacked by a hacker group, "Swagg Security", releasing a massive amount of data including email and server logins, and even more alarming - bank account credentials of large companies like Apple and Microsoft. Swagg Security stages the attack just as a Foxconn protest ignites against terrible working conditions in southern China.
May 24: WHMCS is hacked by UGNazi, they claim that the reason for this is because of the illegal sites that are using their software.
May 31: MyBB is hacked by newly founded hacker group, UGNazi, the website was defaced for about a day, they claim their reasoning for this was because they were upset that the forum board Hackforums.net uses their software.
June 5: The social networking website LinkedIn has been hacked and the passwords for nearly 6.5 million user accounts are stolen by cybercriminals. As a result, a United States grand jury indicted Nikulin and three unnamed co-conspirators on charges of aggravated identity theft and computer intrusion.
August 15: The most valuable company in the world Saudi Aramco is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness . Carried out by an Iranian attacker group called Cutting Sword of Justice. Iranian hackers retaliated against Stuxnet by releasing Shamoon. The malware destroyed over 35,000 Saudi Aramco computers, affecting business operations for months.
December 17: Computer hacker sl1nk announced that he has hacked a total of 9 countries' SCADA systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States.
=== 2013 ===
The social networking website Tumblr is attacked by hackers. Consequently, 65,469,298 unique emails and passwords were leaked from Tumblr. The data breach's legitimacy is confirmed by computer security researcher Troy Hunt.
=== 2014 ===
February 7: The bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to "weaknesses in [their] system" and another $27.4 million went missing from its bank accounts.
October: The White House computer system was hacked. It was said that the FBI, the Secret Service, and other U.S. intelligence agencies categorized the attacks "among the most sophisticated attacks ever launched against U.S. government systems."
November 24: In response to the release of the film The Interview, the servers of Sony Pictures are hacked by a hacker group calling itself "Guardian of Peace".
November 28: The website of the Philippine telecommunications company Globe Telecom was hacked in response to the poor internet service they are distributing.
=== 2015 ===
June: the records of 21.5 million people, including social security numbers, dates of birth, addresses, fingerprints, and security-clearance-related information, are stolen from the United States Office of Personnel Management. Most of the victims are employees of the United States government and unsuccessful applicants to it. The Wall Street Journal and the Washington Post report that government sources believe the hacker is the government of China.
July: The servers of extramaritial affairs website Ashley Madison were breached.
=== 2016 ===
February: The 2016 Bangladesh Bank heist attempted to steal US$951 million from a Bangladesh Bank, and succeeded in getting $101 million - although some of this was later recovered.
July 22: WikiLeaks published the documents from the 2016 Democratic National Committee email leak.
July 29: a group suspected coming from China launched hacker attacks on the website of Vietnam Airlines.
August 13: The Shadow Brokers (TSB) started publishing several leaks containing hacking tools from the National Security Agency (NSA), including several zero-day exploits. Ongoing leaks until April 2017 (The Shadow Brokers)
September: Hacker Ardit Ferizi is sentenced to 20 years in prison after being arrested for hacking U.S. servers and passing the leaked information to members of ISIL terrorist group back in 2015.
October: The 2016 Dyn cyberattack is being conducted with a botnet consisting of IOTs infected with Mirai by the hacktivist groups SpainSquad, Anonymous, and New World Hackers, reportedly in retaliation for Ecuador's rescinding Internet access to WikiLeaks founder Julian Assange at their embassy in London, where he has been granted asylum.
Late 2016: Hackers steal international personal user data from the company Uber, including phone numbers, email addresses, and names, of 57 million people and 600,000 driver's license numbers of drivers for the company. Uber's GitHub account was accessed through Amazon's cloud-based service. Uber paid the hackers $100,000 for assurances the data was destroyed.
=== 2017 ===
February: The Cloudbleed bug was discovered by Google Project Zero team.
April: A hacker group calling itself "The Dark Overlord" posted unreleased episodes of Orange Is the New Black TV series online after failing to extort the online entertainment company Netflix.
May: WannaCry ransomware attack started on Friday, 12 May 2017, and has been described as unprecedented in scale, infecting more than 230,000 computers in over 150 countries. A hacked unreleased Disney film is held for ransom, to be paid in Bitcoin.
May: 25,000 digital photos and ID scans relating to patients of the Grozio Chirurgija cosmetic surgery clinic in Lithuania were obtained and published without consent by an unknown group demanding ransoms. Thousands of clients from more than 60 countries were affected. The breach brought attention to weaknesses in Lithuania's information security.
June: 2017 Petya cyberattack.
June: TRITON (TRISIS), a malware framework designed to reprogram Triconex safety instrumented systems (SIS) of industrial control systems (ICS), discovered in Saudi Arabian Petrochemical plant.
August: Hackers demand $7.5 million in bitcoin to stop pre-releasing HBO shows and scripts, including Ballers, Room 104 and Game of Thrones.
May–July 2017: The Equifax breach.
September 2017: Deloitte breach.
December: Mecklenburg County, North Carolina computer systems were hacked. They did not pay the ransom.
=== 2018 ===
March: The city of Atlanta, Georgia USA computer systems are seized by hackers with ransomware. They did not pay the ransom, and two Iranians were indicted by the FBI on cyber crime charges for the breach.
May: A speculative execution exploit named Speculative Store Bypass (sometimes referred to as "Variant 4") is disclosed by researchers. The town of Wasaga Beach in Ontariao, Canada computer systems are seized by hackers with ransomware.
June: Lazy FP State Restore, a speculative execution exploit affecting Intel Core CPUs, is announced by Intel.
October: West Haven, Connecticut USA computer systems are seized by hackers with ransomware, they paid $2,000 in ransom.
November: The first U.S. indictment of individual people for ransomware attacks occurs. The U.S. Justice Department indicted two men Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri who allegedly used the SamSam ransomware for extortion, netting them more than $6 million in ransom payments. The companies infected with the ransomware. they used included Allscripts, Medstar Health, and Hollywood Presbyterian Medical Center. Altogether, the attacks caused victims to lose more than $30 million, in addition to the ransom payments.
=== 2019 ===
March: Jackson County, Georgia USA computer systems are seized by hackers with ransomware, they paid $400,000 in ransom. The city of Albany, New York USA experiences a ransomware cyber attack.
April: The city of Augusta, Maine USA computer systems are seized by hackers using ransomware. The city of Greenville, North Carolina USA computer systems are seized by hackers using ransomware known as RobbinHood. Imperial County, in California USA, computer systems are seized by hackers using Ryuk ransomware.
May: The city of Baltimore, Maryland USA computer systems are seized by hackers using ransomware known as RobbinHood that encrypts files with a “file-locking” virus, as well as the tool EternalBlue.
June: The city of Riviera Beach, Florida USA paid roughly $600,000 ransom in Bitcoin to hackers who seized their computers using ransomware. Hackers steal 18 hours of unreleased music from the band Radiohead demanding $150,000 ransom. Radiohead released the music to the public anyway and did not pay the ransom.
September: A security flaw in the TLS-handling code of the Exim mail transfer agent is disclosed, which could potentially allow for attackers to execute code remotely as the superuser on affected servers. It was reported that around 5 million servers were impacted at the time of public disclosure.
== 2020s ==
=== 2020 ===
Anonymous announced cyber-attacks of at least five Malaysian websites including that of Johor and Sabah state governments as well as the International Trade and Industry Ministry. As a result, eleven individuals were nabbed as suspects.
In February, an incident occurred where personal information belonging to over 10.6 million guests of MGM Resorts hotels was leaked on a hacking forum. The leaked data consisted of contact information of numerous former hotel guests, including well-known individuals such as Justin Bieber, Twitter CEO Jack Dorsey, and several government officials.
In June 2020, Wattpad, a user-generated stories website, experienced a significant data breach that resulted in the exposure of nearly 268.745.495 million records. This breach had severe consequences as the compromised data was initially sold in private sales for over $100,000. Eventually, it was made available on a public hacking forum, where it was widely shared without any cost. As a result, a vast amount of personal information, including names, usernames, email and IP addresses, genders, general geographic location, birth dates, and passwords stored as bcrypt hashes, were exposed in this incident.
=== 2021 ===
On May 7, 2021, The Colonial Pipeline Cyberattack took place on May 7, 2021, when Colonial Pipeline had a ransomware attack.The cyberattack halted all of the pipelines operations.
Brenntag Ransomware was attacked when a group of hackers extracted 150GB of data during the attack and threatened to leak it unless the company paid $7.5 million.
In the month of August, T-Mobile experienced a data breach. According to reports, the breach resulted in the compromise of customer information such as names, addresses, Social Security numbers, driver's licenses, IMEI and IMSI numbers, as well as ID information. It is estimated that around 50 million existing and potential customers may have been affected by this incident. Taking responsibility for the hack, a 21-year-old individual claimed to have successfully obtained almost 106GB of data from the renowned telecoms giant.
In the month of March, a group of hackers caused significant disruption to Australia's Channel 9 News live broadcast. This incident led to the channel being unable to air multiple shows and also impacted the production of 9 News' printed materials. The attack, which was confirmed to be a ransomware attack, not only successfully took shows off the air but also resulted in the staff being locked out of their email accounts, blocked from accessing the internet, and caused a halt in the production systems for printed materials. It is worth noting that this cyber-attack marked a significant milestone as it was the largest one ever experienced by an Australian media company.
=== 2022 ===
Social media platform Twitter confirms that 5.4 million accounts was stolen
Student loan data exposes 2.5 million social security numbers
In January, Crypto.com made a statement regarding a security breach that occurred within its network. Hackers were able to gain unauthorized access and successfully stole over $30 million worth of cryptocurrency. This incident impacted nearly 500 customers. Crypto.com took immediate action and reassured its affected users by repaying them for any losses incurred due to the breach. It is worth noting that the hackers were able to bypass Crypto.com's two-factor authentication (2FA) protocols to carry out the attack.
Microsoft was hacked by a hacking group called Lapsus$
=== 2023 ===
On September 12, 2023, "CoinEx" a Hong Kong-based cryptocurrency exchange platform loses $70 million leading to CoinEx suspending its withdrawal service in order to avoid losing anymore money. They also announced that the affected users will be repayed entirely for any lost funds.
== References ==
</wikipedia_requested_titles>
Given below is the article you have to analyze. Generate the JSON as per schema with relevant keyword summaries as per instructions.
strictly response in json formate.
<article>
Happy Tuesday! R.I.P. Ryno, my childhood sports hero. Send news tips and baseball nostalgia to:
[email protected]
Google says U.K. hasn’t demanded “back door” to users’ private data.
Google told The Washington Post Tuesday that the British government has never asked it for special access to users’ private messages and data, after a U.S. lawmaker’s letter drew fresh attention to the issue.
</article>