Government - Page 66
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The co-chairman of the Congressional Internet Caucus has said that he would urge the newly appointed Director of Homeland Security to address the threat of electronic attacks as a part of any national plan aimed at combating terrorism. In a speech . . .
A new TV public service announcement targets U.S. computer hacktivists with a blunt message: Uncle Sam wants you to help fight the war on terrorism. But the spot, which organizers hope to begin airing nationwide next week on major networks, will . . .
US Attorney General John Ashcroft went to Capitol Hill Monday afternoon to sell the Bush Administration's new slew of anti-terror laws to the House Judiciary Committee. Among the many provisions to make the entire US populace an Enemy of the State . . .
The United States needs to develop a comprehensive strategy for protecting the country from a wide range of threats--including cyberattacks and terrorism --and could learn from the Year 2000 computer problem, according to the General Accounting Office. In congressional testimony . . .
Sen. Robert Bennett (R-Utah) introduced legislation Sept. 24 to allow the federal government and industry to share information about potential threats to the nation's critical infrastructure. The Critical Infrastructure Information Security Act, co-sponsored by Sen. Jon Kyl (R-Ariz.) is intended to . . .
With attention focused like never before on airport, airline and air traffic control security, government and industry representatives at a congressional hearing Sept. 20 repeated warnings made in years past: Technology needs to play a bigger role and be secured.. . .
As Attorney General John Ashcroft fielded reporters' questions last Tuesday about the attack on the World Trade Center and the Pentagon, one journalist asked if a new computer worm, discovered only hours earlier, was in any way related to the terrorist . . .
U.S. Officials mobilizing to freeze the financial assets of international terrorist Osama bin Laden may resort to cybermethods, such as hacking, to cut off the money supply that has been used to finance his terrorist activities, including the Sept. 11 attacks . . .
The National Institute of Standards and Technology on Sept. 10 released the final version of a step-by-step guide for agencies to measure the effectiveness of their information security programs and plans. The special publication, "Security Self-Assessment Guide for Information Technology Systems," . . .
As the U.S. government begins to formulate policy in response to the terrorist attacks last week, it is faced with trying to heighten national security and preparedness while preserving American citizens' civil liberties. Government officials will likely find that balance particularly . . .
Last week's terrorist attacks on the United States are expected to shift government and legislative priorities on a host of technology issues. Internet privacy, for instance, the top technology policy issue barely more than a week ago, will likely be replaced . . .
In the wake of the Sept. 11 terrorist attacks, the Senate passed legislation Sept. 13 to ease restrictions on the surveillance of e-mail traffic and other electronic communications. An amendment to a $40 billion emergency funding bill would make it dramatically . . .
The European Parliament published its report into the Echelon spying system last week in which it concluded it did exist, was against the law and that the UK had a lot of explaining to do. We've sifted through about 100 of . . .
The encryption wars have begun. For nearly a decade, privacy mavens have been worrying that a terrorist attack could prompt Congress to ban communications-scrambling products that frustrate both police wiretaps and U.S. intelligence agencies. Tuesday's catastrophe, which shed more blood on . . .
Officials at the FBI's National Infrastructure Protection Center (NIPC), located at FBI headquarters here, are gathering for an emergency meeting to collect and analyze all available cyberintelligence information, said Navy Rear Adm. James Plehal, the deputy director of the NIPC. Details . . .
The Federal Aviation Administration is moving forward with a pair of information technology security initiatives that were set in motion long before Tuesday's terrorist attacks, according to the agency's chief scientist for IT. Marshall Potter, technical adviser and chief scientist . . .
The National Security Agency is beginning a 15-year, multibillion-dollar effort to modernize the nation's cryptographic systems, which are rapidly growing obsolete and vulnerable. Cryptographic systems encode messages and include such tools as secure telephones, tactical radios and smart cards. Virtually every . . .
Two well-known computer security experts pulled down their works from the Internet this week for fear of being prosecuted under 1998's Digital Millennium Copyright Act. Along with the threatened lawsuit of Princeton computer-science professor Edward Felten, and the arrest of Russian . . .
India's first police station to exclusively handle cybercrimes such as computer hacking, data damage and Internet fraud will start work in Bangalore on September 15, police said on Friday. The station, which would cover the state of Karnataka, was launched on Thursday, a senior police official told Reuters. . . .
Two men have been arrested and accused of scheming to smuggle military encryption technology to China, the Customs Service said Wednesday. The technology, two devices known as KIV-7HS units, are used to encode classified government communications. "The technology that these individuals . . .