Government - Page 69
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Today, they defend the U.S. military's 2.5 million computers against hackers. But they are being trained to guard against computer attacks by other countries and to launch computer virus invasions that will bring chaos to a foe's communications networks, financial systems . . .
A powerful host lawmaker on Thursday asked the FBI to re-examine the extent to which its e-mail sniffing tool, Carnivore, infringes on privacy. House Majority Leader Dick Armey in a letter asked Attorney General John Ashcroft to take a look at . . .
The Bush administration is wrapping up details on a new governmentwide structure to lead national cybersecurity efforts, again rejecting the idea of having a security czar. White House officials have been working for months on ways to reorganize the government's initiatives . . .
Federal law enforcement officials will testify before a House panel Tuesday on their agencies' efforts to fight cybercrime. The afternoon hearing is the second in a series of three the House Judiciary Crime Subcommittee is holding on the issue. Representatives . . .
If the feds want to spy on your home using whizzy tech gadgets, they'd better get a warrant first, the Supreme Court said on Monday. In an important 5-4 ruling that extends privacy's shield to radiation not visible to the human . . .
One in four Web sites run by the Defense Department have no privacy statement posted, according to an oversight report released Tuesday. An even larger number collect information about the public despite a White House directive barring the practice. The audit . . .
We're going to convince you that you should call the FBI if your company is ever the victim of a computer crime. That's right, the Federal Bureau of Investigation. The feds. Government agents. Now, before you say "I don't think so" . . .
Poor computer security could let hackers break into the federal agency that compiles crop forecasts for commodity traders, according to a government audit. The National Agricultural Statistics Service's computers "are vulnerable to cyber-related attacks, jeopardizing the integrity and confidentiality of NASS' . . .
Staffers at Alldas, an archive that maintains copies of websites that have been involuntarily altered, believes that their site is being deliberately blocked from accessing defaced websites owned by the United States military. Alldas staffers believe that the U.S. military is . . .
A federal agent tracks a hacking attack back to Mathias' firm. Could an employee be the perpetrator? The agent went on to briefly explain that on April 4, a computer with a certain IP address that was traced back to a computer at my company was used to hack into a Domain Name System (DNS) server within a small financial institution in the Southeast. . . .
The Navy is considering using one standard portal product that will help control individuals' access to applications the Navy will place on its $6.9 billion intranet. Users logging on to the Navy Marines Corps Intranet, which will tie together on one . . .
The Council of Europe, enthused by considerable American guidance and support, has issued a proposed final draft for an international cybercrime treaty. The treaties purpose is to harmonize statutes related to electronic criminal activity, cross-border police cooperation, and judicial policy throughout . . .
An investigative committee of the European Parliament has concluded that the U.S. National Security Agency, along with the intelligence services of four other countries, operate a global electronic surveillance network code-named Echelon, but that the system is far less capable than . . .
The administration's top security coordinator Richard Clarke once warned that the United States could face an "electronic Pearl Harbor" if the nation's electronic defenses were not strengthened. He painted an equally gloomy picture earlier this week. The increasing sophistication of electronic . . .
Senior government officials are studying the feasibility of dividing the next-generation Internet into a series of virtual private networks that could insulate critical national services, such as those provided by the Federal Aviation Administration (FAA) and the finance industry, from hackers . . .
A report released Thursday found that staff shortages and vacancies in key positions kept a government anti-computer-crime unit from alerting the public to dangerous computer viruses until the damage already was done. "While some warnings were issued in time to avert . . .
The National Science Foundation on Tuesday announced it has awarded $8.6 million in scholarship money to six schools in the first round of its Scholarship for Service program. The program provides scholarships to undergraduate and graduate students who . . .
Max Butler lived three lives for five years. As "Max Vision," he was an incredibly skilled hacker and security expert who boasted that he'd never met a computer system he couldn't crack. As "The Equalizer," he was an FBI informant, reporting . . .
The Defense Department is taking additional steps to shield its computer networks against hackers and terrorists but it also must defend itself from insiders, lawmakers were told Thursday. The Department is increasingly dependent on a "global information environment" over which . . .
Unidentified hackers have been trying to break into Defense Department computer networks in a constant push to disrupt U.S. military forces, the Pentagon's chief information officer said on Thursday. "Dó is probed on a daily basis by those who are trying, . . .