Government - Page 66

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

A TV Plea for Patriot Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new TV public service announcement targets U.S. computer hacktivists with a blunt message: Uncle Sam wants you to help fight the war on terrorism. But the spot, which organizers hope to begin airing nationwide next week on major networks, will . . .

Bush admin to make hacking a terrorist offence

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

US Attorney General John Ashcroft went to Capitol Hill Monday afternoon to sell the Bush Administration's new slew of anti-terror laws to the House Judiciary Committee. Among the many provisions to make the entire US populace an Enemy of the State . . .

Y2K may be model for defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The United States needs to develop a comprehensive strategy for protecting the country from a wide range of threats--including cyberattacks and terrorism --and could learn from the Year 2000 computer problem, according to the General Accounting Office. In congressional testimony . . .

Bill would boost info sharing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sen. Robert Bennett (R-Utah) introduced legislation Sept. 24 to allow the federal government and industry to share information about potential threats to the nation's critical infrastructure. The Critical Infrastructure Information Security Act, co-sponsored by Sen. Jon Kyl (R-Ariz.) is intended to . . .

Tech security options floated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With attention focused like never before on airport, airline and air traffic control security, government and industry representatives at a congressional hearing Sept. 20 repeated warnings made in years past: Technology needs to play a bigger role and be secured.. . .

Cyberterrorists: our invisible enemies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As Attorney General John Ashcroft fielded reporters' questions last Tuesday about the attack on the World Trade Center and the Pentagon, one journalist asked if a new computer worm, discovered only hours earlier, was in any way related to the terrorist . . .

NIST: Final security guide arrives

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute of Standards and Technology on Sept. 10 released the final version of a step-by-step guide for agencies to measure the effectiveness of their information security programs and plans. The special publication, "Security Self-Assessment Guide for Information Technology Systems," . . .

U.S. commission examines cyberterrorism

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the U.S. government begins to formulate policy in response to the terrorist attacks last week, it is faced with trying to heighten national security and preparedness while preserving American citizens' civil liberties. Government officials will likely find that balance particularly . . .

Information security will be key with lawmakers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week's terrorist attacks on the United States are expected to shift government and legislative priorities on a host of technology issues. Internet privacy, for instance, the top technology policy issue barely more than a week ago, will likely be replaced . . .

Senate OKs easier use of Carnivore

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the wake of the Sept. 11 terrorist attacks, the Senate passed legislation Sept. 13 to ease restrictions on the surveillance of e-mail traffic and other electronic communications. An amendment to a $40 billion emergency funding bill would make it dramatically . . .

This is how we know Echelon exists

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The European Parliament published its report into the Echelon spying system last week in which it concluded it did exist, was against the law and that the UK had a lot of explaining to do. We've sifted through about 100 of . . .

Congress Mulls Stiff Crypto Laws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The encryption wars have begun. For nearly a decade, privacy mavens have been worrying that a terrorist attack could prompt Congress to ban communications-scrambling products that frustrate both police wiretaps and U.S. intelligence agencies. Tuesday's catastrophe, which shed more blood on . . .

Government braces for computer-terrorism attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Officials at the FBI's National Infrastructure Protection Center (NIPC), located at FBI headquarters here, are gathering for an emergency meeting to collect and analyze all available cyberintelligence information, said Navy Rear Adm. James Plehal, the deputy director of the NIPC. Details . . .

FAA plans new IT security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Federal Aviation Administration is moving forward with a pair of information technology security initiatives that were set in motion long before Tuesday's terrorist attacks, according to the agency's chief scientist for IT. Marshall Potter, technical adviser and chief scientist . . .

NSA begins crypto upgrade

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency is beginning a 15-year, multibillion-dollar effort to modernize the nation's cryptographic systems, which are rapidly growing obsolete and vulnerable. Cryptographic systems encode messages and include such tools as secure telephones, tactical radios and smart cards. Virtually every . . .

Security experts protest copyright act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two well-known computer security experts pulled down their works from the Internet this week for fear of being prosecuted under 1998's Digital Millennium Copyright Act. Along with the threatened lawsuit of Princeton computer-science professor Edward Felten, and the arrest of Russian . . .

India to open first cybercrime police station

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

India's first police station to exclusively handle cybercrimes such as computer hacking, data damage and Internet fraud will start work in Bangalore on September 15, police said on Friday. The station, which would cover the state of Karnataka, was launched on Thursday, a senior police official told Reuters. . . .

Two men arrested for planning to smuggle high-tech encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two men have been arrested and accused of scheming to smuggle military encryption technology to China, the Customs Service said Wednesday. The technology, two devices known as KIV-7HS units, are used to encode classified government communications. "The technology that these individuals . . .