Government - Page 73
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Criminal Investigation Bureau (CIB) yesterday referred to prosecutors a computer engineer who allegedly hacked into a computer server in what he called "self-defense." The Hsinchu computer engineer, surnamed Fan (S), said he thought that the other side attacked his computer . . .
Hackers now have a new tag in the U.K.: cyberterrorists. Under the Terrorism Act 2000, enacted into law beginning Monday, people who endanger lives through the manipulation of public computer systems will be punished under the anti-terrorism law as would any . . .
Senior lawmakers who conduct oversight of US intelligence programs say modernizing technology at the National Security Agency (NSA) and beefing up the CIA's spy network are priorities this year. "Funding NSA for this year and in the future is a . . .
Computer hackers could be classed as terrorists under a UK law that came into force today. The Terrorism Act 2000 is designed to prevent dissident political groups from using the UK as a base for terrorism and recognises a . . .
A bill designed to give consumers and ISPs greater control over a flood of unwanted e-mail, commonly known as spam, was introduced Wednesday by the same U.S. representatives who sponsored the legislation in the last Congress.. . .
The National Institute of Standards and Technology released Monday new draft guidance on intrusion-detection systems, outlining all the factors agencies need to consider when integrating these security systems into their networks. The guidance is part of a series of special . . .
How's this for a curious pairing? Stephen Hsu and his partners at SafeWeb Inc. launch a Web site offering the utmost in Internet privacy - and then hook up with the notoriously intrusive Central Intelligence Agency. The CIA, in this case, wants to use a SafeWeb program to mask its own movements on the Internet, so it can gather information incognito.. . .
The Bush administration is reviewing whether to continue the operations of the government office that coordinates critical infrastructure policy, according to the head of the office, which is slated for termination this fall. John Tritak, director of the Critical Infrastructure . . .
The FBI has dressed its online wolf in sheep's clothing, changing the name of its controversial email surveillance system -- known up until now as Carnivore. Carnivore now goes by the less beastly moniker of DCS1000, drawn from the . . .
These must be jittery times for anyone in the military who uses the Internet. Not only do they have to guard against Love Bug worms and security holes in Microsoft Outlook -- now they've got to worry about Fidel Castro . . .
In an effort to improve the state of consumer privacy, the Federal Reserve Board, the FDIC, the OCC, and the Office of Thrift Supervision on January 17 announced that they have put together joint guidelines to safeguard confidential customer information. The . . .
Recognizing that national security is no longer the sole concern of the Defense Department, a new report by a federal commission pushes for a vast reorganization of the federal government and an overhaul of the appropriations process. The report by the . . .
Software emulation firm VMware announced it has teamed up with researchers at the National Security Agency to create a nearly crack-proof computer that can place sensitive data in virtual vaults inside the PC. The concept, assuming it works, would streamline the . . .
Super Bowl 2001 fans were secretly treated to a mass, biometric scan in which video cameras tied to a temporary law-enforcement command centre digitised their faces and compared them against photographic lists of known malefactors. Everyone entering Raymond James Stadium in . . .
Computer systems at more than 60 agencies in the District of Columbia remain at risk because of shoddy computer security practices at the DC Department of Public Works, the General Accounting Office (GAO) said today. In a comprehensive audit of . . .
The Bush administration and Congress should focus on better science and math education to boost high technology and leave privacy concerns to the companies involved, a technology trade group said in a report released Tuesday. The American Electronics Association, the largest . . .
The U.S. Senate has received another Internet privacy bill, indicating that the issue of online consumer privacy promises to be one of the hottest topics during the current legislative session. Adding to the chorus of policymakers who have made Internet privacy . . .
The chairman of the House Commerce Committee demanded to know the status of an overdue report on the Clinton administration's efforts to protect the nation's most critical computer systems from cyber-attacks. In a letter addressed to Richard Clarke, the national coordinator . . .
Although information security is one of two governmentwide issues labeled "high-risk," guidance and legislation issued over the past six months could significantly reduce federal agencies' risk, according to the General Accounting Office. Security has been on the GAO high-risk list . . .
On his last full day in office, former President Clinton appointed 21 members to a newly established council that will advise President George W. Bush on ways to protect the nation's most critical computer systems from cyber attack. The new . . .