Government - Page 69

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Cyberspace: The next battlefield

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Today, they defend the U.S. military's 2.5 million computers against hackers. But they are being trained to guard against computer attacks by other countries and to launch computer virus invasions that will bring chaos to a foe's communications networks, financial systems . . .

Bush wrapping up cybersecurity plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration is wrapping up details on a new governmentwide structure to lead national cybersecurity efforts, again rejecting the idea of having a security czar. White House officials have been working for months on ways to reorganize the government's initiatives . . .

Federal cybercrime experts to tell House about efforts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal law enforcement officials will testify before a House panel Tuesday on their agencies' efforts to fight cybercrime. The afternoon hearing is the second in a series of three the House Judiciary Crime Subcommittee is holding on the issue. Representatives . . .

Can't Scan Without a Warrant

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If the feds want to spy on your home using whizzy tech gadgets, they'd better get a warrant first, the Supreme Court said on Monday. In an important 5-4 ruling that extends privacy's shield to radiation not visible to the human . . .

Defense sites track visitors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One in four Web sites run by the Defense Department have no privacy statement posted, according to an oversight report released Tuesday. An even larger number collect information about the public despite a White House directive barring the practice. The audit . . .

Recovering from an attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We're going to convince you that you should call the FBI if your company is ever the victim of a computer crime. That's right, the Federal Bureau of Investigation. The feds. Government agents. Now, before you say "I don't think so" . . .

Crop data vulnerable to hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Poor computer security could let hackers break into the federal agency that compiles crop forecasts for commodity traders, according to a government audit. The National Agricultural Statistics Service's computers "are vulnerable to cyber-related attacks, jeopardizing the integrity and confidentiality of NASS' . . .

Is Military Hiding Hacks?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Staffers at Alldas, an archive that maintains copies of websites that have been involuntarily altered, believes that their site is being deliberately blocked from accessing defaced websites owned by the United States military. Alldas staffers believe that the U.S. military is . . .

What to Do When the Feds Come Knocking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal agent tracks a hacking attack back to Mathias' firm. Could an employee be the perpetrator? The agent went on to briefly explain that on April 4, a computer with a certain IP address that was traced back to a computer at my company was used to hack into a Domain Name System (DNS) server within a small financial institution in the Southeast. . . .

Navy weighs NMCI portal security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Navy is considering using one standard portal product that will help control individuals' access to applications the Navy will place on its $6.9 billion intranet. Users logging on to the Navy Marines Corps Intranet, which will tie together on one . . .

Cyber-crime justifies world government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Council of Europe, enthused by considerable American guidance and support, has issued a proposed final draft for an international cybercrime treaty. The treaties purpose is to harmonize statutes related to electronic criminal activity, cross-border police cooperation, and judicial policy throughout . . .

Report urges Europeans to take anti-Echelon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An investigative committee of the European Parliament has concluded that the U.S. National Security Agency, along with the intelligence services of four other countries, operate a global electronic surveillance network code-named Echelon, but that the system is far less capable than . . .

Cyber-security help wanted

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The administration's top security coordinator Richard Clarke once warned that the United States could face an "electronic Pearl Harbor" if the nation's electronic defenses were not strengthened. He painted an equally gloomy picture earlier this week. The increasing sophistication of electronic . . .

Feds mull global VPNs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Senior government officials are studying the feasibility of dividing the next-generation Internet into a series of virtual private networks that could insulate critical national services, such as those provided by the Federal Aviation Administration (FAA) and the finance industry, from hackers . . .

Report finds failings in federal computer crime unit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A report released Thursday found that staff shortages and vacancies in key positions kept a government anti-computer-crime unit from alerting the public to dangerous computer viruses until the damage already was done. "While some warnings were issued in time to avert . . .

NSF funds infosec scholarships

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Science Foundation on Tuesday announced it has awarded $8.6 million in scholarship money to six schools in the first round of its Scholarship for Service program. The program provides scholarships to undergraduate and graduate students who . . .

A 'White Hat' Goes to Jail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Max Butler lived three lives for five years. As "Max Vision," he was an incredibly skilled hacker and security expert who boasted that he'd never met a computer system he couldn't crack. As "The Equalizer," he was an FBI informant, reporting . . .

Pentagon: We're under heavy attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Unidentified hackers have been trying to break into Defense Department computer networks in a constant push to disrupt U.S. military forces, the Pentagon's chief information officer said on Thursday. "Dó is probed on a daily basis by those who are trying, . . .