Government - Page 14
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The TSA does not have to tell the truth: Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request? Sure, no problem! Even the NSA responds that they "can't confirm or deny the existence" of classified things for which admitting or denying existence would (allegedly, of course) damage national security.
Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.
A second member of the notorious hacking collective LulzSec has been sentenced for his involvement in the 2011 Sony Pictures Entertainment breach.
US Army private Bradley Manning was convicted on 19 counts, including charges under the Espionage Act and the Computer Fraud and Abuse Act for leaking approximately 700,000 government documents to WikiLeaks.
In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company's blog to deny it.
Gen. Keith B. Alexander, director of the National Security Agency, stood in front of a standing-room-only crowd Wednesday, selling the idea of government surveillance programs.
After spending three years in custody, the man accused of the largest leak of classified information in U.S. history will learn Tuesday whether he has been found guilty of aiding the enemy.
The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination of profiling and "see something, say something" is unlikely to work.
In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins: NSA chief Keith Alexander said his agency had implemented a "two-man rule," under which any system administrator like Snowden could only access or move key information with another administrator present. With some 15,000 sites to fix, Alexander said, it would take time to spread across the whole agency.
Former CIA employee Edward Snowden has carried out one of the biggest leaks in US history, exposing a top-secret NSA surveillance program to the media. Leading tech companies were revealed to be involved in intelligence gathering through PRISM spy tool.
Two weeks ago, the Guardian published two new Snowden documents. These outline how the NSA's data-collection procedures allow it to collect lots of data on Americans, and how the FISA court fails to provide oversight over these procedures.
Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Sen. Patrick Leahy (D-Vermont), the powerful chairman of the Senate Judiciary Committee, and other lawmakers today introduced legislation they say would provide more accountability and oversight of laws bolstering recently disclosed surveillance programs.
Companies allow US intelligence to exploit vulnerabilities before it patches them: Microsoft Corp. (MSFT), the world's largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process.
Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written in plain English on the documents you have to sign when you get a security clearance, and it's part of the culture. The law is there for a good reason, and secrecy has an important role in military defense.
At the same time, it reports the number of demands for