Government - Page 53

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Proposed bill could jail hackers for life

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A last-minute addition to a proposal for a Department of Homeland Security bill would punish malicious computer hackers with life in prison. The U.S. House of Representatives on Wednesday evening voted 299 to 121 to approve the bill, which would reshape large portions of the federal bureaucracy into a new department combining parts of 22 existing federal agencies. . .

Hacker suspect to fight extradition to U.S.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An unemployed British computer administrator will fight U.S. efforts to extradite him to face criminal charges in what U.S. authorities are calling the largest ever successful hacking effort against American military networks, his lawyer said Wednesday. . .

Perspective: Why IT will love Homeland Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week's congressional midterm election means that the Homeland Security Department will be assembled fast--and that's the best news the technology market has heard since Netscape went public.The power shift in Congress means that IT and outsourcing budgets that had been . . .

HHS Sets Deal For Intrusion Detection Service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Through a new task order for security services, the Health and Human Services Department has kicked off an effort to consolidate many IT services across its bureaus. The department this month signed a five-year task order with Internet Security Systems . . .

House Approves Cybersecurity Bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Congress approved a massive spending program on Tuesday afternoon that will allocate nearly a billion dollars for computer security research. By a voice vote, the U.S. House of Representatives agreed to the Cyber Security Research and Development Act (CSRDA), which . . .

Still A Disconnect At Interior

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

About 6 percent of the Interior Department's computer systems remain disconnected from the Internet, 11 months after a federal judge ordered a departmentwide shutdown citing security concerns, according to a Nov. 1 Interior report. . .

Computer Break-Ins: Your Right to Know

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

California law now demands that the public be informed when government or corporate databases are breached. It's about time. In April, 2002, hackers broke into the payroll database for the state of California. For more than a month, cybercriminals rooted around in the personal information of 265,000 Golden State employees, ranging from Governor Gray Davis to maintenance workers and clerks. . .

Homeland Security CIO Wants 'Network of Networks'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Calling for help from the private sector, Steve Cooper, special assistant to the President and CIO in the White Houses' Office of Homeland Security, called for a "network of networks" of federal, state, and local governments and certain private sector industries . . .

The FBI's Cybercrime Crackdown

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To protect the classified information stored on her desktop computer, Special Agent Nenette Day uses one of the most powerful tools on the planet -- an air gap. Day points to an IBM ThinkPad. . .

Homeland Security Bill Set For Quick Action

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Senate likely will act quickly to pass homeland security legislation already cleared by the House and send it to a conference committee for speedy consideration, legislative sources said. As Republicans gain control of the Senate, prospects for Democrats' objections to . . .

Navy Sites Spring Security Leaks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Navy took one of its websites offline Tuesday and added new security controls to a second site after Internet surfers discovered they could access confidential Navy databases. The exposed Navy files included material designed to support a machine . . .

China's Cyberwall Nearly Concrete

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While the Great Wall no longer deters would-be invaders from entering China, experts meeting in Washington on Monday said the Chinese government continues to maintain a nearly rock-solid cyberwall. At a panel discussion held by the Congressional-Executive Commission on China, . . .

Electronic elections: What about security?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As Americans go to the polls today, a record number of counties -- almost one fifth by some estimates -- will be tallying the votes on electronic voting machines. But some experts worry that despite rigorous testing, the machines may not be as secure as their makers promise. . . .

Open source courses through DOD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What would happen if open source software were banned in the Defense Department? A recent study conducted by Mitre Corp. for DOD posed that hypothetical question and found this answer: The department's cybersecurity capabilities would be crippled and other areas would be severely impacted.. . .

Feds Getting IT Together

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Government security officials have begun a new era of interagency cooperation that has led to unprecedented levels of information sharing. And while the high-level meetings have strengthened government security capabilities, they have also highlighted shortcomings in a key part of the data gathering and analysis processes. . . .

DOD official outlines IT challenges

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the military services continue to fight the first war of the Information Age, the Defense Department is making information technology a top priority - but not without major challenges, according to Paul Wolfowitz, deputy Defense secretary. . .