Government - Page 62

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Government Cybersecurity Center Takes Shape

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

n a move applauded by government officials, the Bush administration last week announced plans to establish a central office to coordinate the government's response to cybersecurity attacks. The center will be modeled on the Year 2000 Information Coordination Center (ICC), which . . .

FTC sting looks to quash spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FTC's operation began in 2000, when it sent 1,000 spammers letters to warn them that a particular e-mail chain letter scheme they were involved in was illegal. Chain letters that promise money or other value to the recipient in exchange . . .

Federal computer security guidelines published

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first guidelines for responding to attacks on computer systems to be endorsed by both the FBI and the Secret Service, the main federal agencies fighting such crimes, were published yesterday. The guidelines were drafted by government and private security experts . . .

Cybercrime Bill Ups the Ante

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some forms of illegal hacking would be punished by life imprisonment under a proposal that Congress will debate on Tuesday. A House Judiciary subcommittee will consider the Cyber Security Enhancement Act (CSEA), which ups the penalties for computer intrusions, funds . . .

FTC prepares to bust spammers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Federal Trade Commission is training its legal guns on spam. On Tuesday, the agency plans to unveil an aggressive three-point program to crack down on unwanted commercial e-mail. The agency receives about 10,000 e-mails a day in a database it set up for consumers to forward their unsolicited mail.. . .

Computer Safety Is Focus of Bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The House approved more than $800 million in grants today covering the next five years for the National Science Foundation and the National Institute of Standards and Technology to conduct research on ways to strengthen network and computer security. "Our . . .

Treasury computers said vulnerable

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Government computers that keep track of trillions of dollars as they flow in and out of Washington D.C. remain vulnerable to computer hackers, according to a report released by Congress' General Accounting Office. The report says that Treasury Department computer systems . . .

Computer security bill backed by ITAA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An influential high-tech lobby group Thursday told leadership in the House of Representatives that it supports a cybersecurity bill backed by Rep. Sherwood Boehlert, R-N.Y., that is "crucial" for increasing online security research. Information Technology Association of America (ITAA) President Harris . . .

Justice Dept. to hire more computer crime attorneys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Justice Department has begun soliciting hundreds of resumes from attorneys skilled in computer crime and intellectual property law in an effort to keep pace with a growing caseload of cybercrime prosecutions. The Justice Department recently sent out a notice . . .

NIST prepping security guides

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute of Standards and Technology's security team will be releasing more than 30 guides over the coming year to help agencies with many crucial technical and policy security concerns, officials said last week. The NIST Computer Security Resource Center . . .

Tech aimed at homeland security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Washington, D.C., think tank is calling for increased use of information technology -- including smart identification cards and the linking of databases -- to improve homeland security. It also advocates the creation of a chief information officer responsible for reviewing . . .

Software security law call

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An influential body of researchers is calling on the US Government to draft laws that would punish software firms that do not do enough to make their products secure. The US National Academy of Sciences (NAS) has released drafts of a . . .

DOT sees security short-changed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Transportation Department is working with the Bush administration to ensure that information security is not left behind as increasing amounts of money go to strengthen the other forms of security throughout the department, top information technology officials said Jan. 14.. . .

U.S. Cyber Security Weakening

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

U.S. computer systems are increasingly vulnerable to cyber attacks, partly because companies are not implementing security measures already available, according to a new report released Tuesday. "From an operational standpoint, cyber security today is far worse that what known best practices . . .

Homeland security IT spending lags

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most of the federal money made available after the Sept. 11 terrorist attacks is not going to information technology projects, but technology will play a larger role as agencies determine their homeland security needs during the coming months, industry experts said . . .

Lawmaker: Legalize home CD burning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A U.S. congressman said Monday that he intended to change a controversial copyright law to allow consumers to override technologies that prevent them from making digital copies of music, movies and software. Rep. Rick Boucher, D-Va., said he plans to introduce a bill that would eliminate the "anti-circumvention" clause of the Digital Millennium Copyright Act (DMCA), a 1998 law that updated copyright laws for the digital era. . . .

US judge allows FBI keyboard sniffing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal judge in New Jersey has ruled that evidence secretly gathered by the FBI to catch an alleged mob loan shark can be used in a trial later this year. US District Judge Nicholas Politan said it was acceptable for . . .