Government - Page 60

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Cyber-spies needed for Ottawa jobs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Canada's electronic spy agency is coming out of the shadows for its biggest recruitment campaign since the Cold War. The clandestine Communications Security Establishment expects to expand its workforce of cyber-spies and high-tech whizzes by at least one-third over the next 18 months, a surge of unprecedented growth for the agency whose roots stretch back to the Second World War. . . .

Sharing seen as critical for security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The private sector manages more than 85 percent of the nation's critical infrastructure and must therefore collaborate with the government to protect those resources, according to government and industry leaders speaking at a May 8 Senate Governmental Affairs Committee hearing. . . .

CERT running security pilots

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CERT Coordination Center at Pennsylvania's Carnegie Mellon University has developed two unique pilot programs designed to bolster the information assurance capabilities of government agencies. . . .

Interior security flagged again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A month after getting permission to reconnect some of its sites to the Internet, the Interior Department's Minerals Management Service is back in the hot seat. MMS has once again caught the attention of court-appointed Special Master Alan Balaran for . . .

Where's SDMI? Code to battle piracy is MIA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Four years ago the record industry and some technology companies banded together to match wits in a combined effort to stamp out Internet music piracy. Their goal: to usher in an age of secure digital songs wrapped in unbreakable code.. . .

Security Agents Head For Cybercrime School

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security agents from both sides of the Atlantic are being sent to school so they can trace and prosecute computer criminals. The FBI, U.S. Customs, the High Technology Crime Investigation Association, Europol and the U.K.'s National High-Tech Crime Unit are among the agencies that have sent staff to learn about cybercrime, fraud, hacking and software bugs, according to the company, Massachusetts-based QinetiQ Trusted Information Management. . . .

New internet legislation outlaws all hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New amendments to Hungary's laws on internet crime have drawn criticism from industry players for not distinguishing enough between minor and major crimes. "The law is strict in places it shouldn't be so strict," said Dániel Nemes, CEO of internet firm telnet Hungary Rt, highlighting the fact that the amendments to Hungary's Criminal Code, which are effective from April 1, outlaw any attempt at hacking, even if no damage is caused.. . .

Congress: Tighten IT security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Prompted by last year's terrorist attacks, momentum is building on Capitol Hill to expand the role of the National Institute of Standards and Technology in establishing IT security standards and best practices. But the prospect is raising concerns in some circles. . . .

White House cyber czar describes next phase of Internet plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Speaking before a conference of hundreds of federal technology personnel and industry officials Wednesday morning, Richard Clarke, President Bush's point man on national cybersecurity, outlined the next phase in the controversial plan to build an impenetrable information network for the federal government, known as Govnet. . . .

Ashcroft orders more info sharing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Information from databases, such as names of terrorism suspects, fingerprints, photographs and biographical data, should be regularly available to a wider range of law enforcement agencies, Ashcroft said. However, the directive, issued April 11, deals primarily with developing policies, guidelines and . . .

Step-by-step bomb guide 'made public'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The UK Ministry of Defence (MoD) says it is "checking" claims that one of its documents - detailing a step-by-step guide on how to build an atomic bomb - has been put in a public office for all to see. . . .

Free Speech Online and Offline

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Esther Dyson famously argued that as the world will never be perfect, whether online or offline, it is foolish to expect higher standards on the Internet than we accept in `real life'. Legislators are now turning this argument round, and arguing that they have to restrict traditional offline freedoms in order to enable the regulation of cyberspace.. . .

Fears of a Security Brain Drain

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some computer security professionals are already feeling the pinch from a new Defense Department policy discouraging contractors from hiring non-citizens. The Pentagon says it's about loyalty; visa holders call it classic xenophobia. . . .

Outflanking The Cyberterrorist Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The speed at which critical national functions are being moved online increases the risk of vulnerability, say former CIA and NSA security experts in exclusive interviews with Computerworld. While cyberterrorism may not be an immediate threat, it would be foolish not to recognize that the U.S. is facing a "thinking enemy" who will adapt to attack our critical infrastructures and vulnerabilities. . .