Government - Page 27

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Two convicted for refusal to decrypt data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two people have been successfully prosecuted for refusing to provide authorities with their encryption keys, resulting in landmark convictions that may have carried jail sentences of up to five years. The government said today it does not know their fate.

Security Cyber Czar Steps Down

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House's acting cybersecurity czar announced her resignation Monday, in a setback to the Obama administration's efforts to better protect the computer networks critical to national security and the global economy. The resignation highlights the difficulty the White House has had following through on its cybersecurity effort.

UK, not North Korea, source of DDOS attacks, researcher says

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's another perspective on the attacks against US government institutions. Do you believe it was North Korea, from the UK, or elsewhere? Perhaps not by some organized effort at all?The U.K. was the likely source of a series of attacks last week that took down popular Web sites in the U.S. and South Korea, according to an analysis performed by a Vietnamese computer security analyst.

North Korea's Cyber War

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

File this one under "Government Security" -- a nice and succinct article about the recent attacks against US government institutions, and what the US is battling.North Korea celebrated America

Pirate Bay retrial denied; judge declared "unbiased"

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After The Pirate Bay defendants lost a high-profile copyright infringement trial in Sweden, they charged that the judge belonged to pro-copyright groups and was therefore biased against them. A Court of Appeals ruling today disagrees; there will be no retrial.

Media Misreports on Biased Pirate Bay Judge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Three judges are currently reviewing the judge that handled the Pirate Bay trial to discover if he was biased or not. No decision has yet been made but the New York Times and several other publications report inaccuracies and plain wrongs that claim otherwise. Time to get the facts straight.

Hacker named to Homeland Security Advisory Council

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jeff Moss, founder of the Black Hat and Defcon hacker and security conferences, was among 16 people sworn in on Friday to the Homeland Security Advisory Council. The HSAC members will provide recommendations and advice directly to Secretary of Homeland Security Janet Napolitano.

Judge Dismisses NSA Wiretap Civil Liberties Suits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What kind of far-reaching implications does this have? Can organization's, working with the government, really be allowed to monitor communications unencumbered? Can they watch for some sort of illegal activity, terrorist or not, and then arrest someone, without having previously had a warrant?A federal judge on Wednesday threw out 46 civil lawsuits filed against telecommunications companies for allowing the National Security Agency to probe their networks for terrorist communications without approval from a court. Companies such as AT&T were granted immunity under the Foreign Intelligence Surveillance Act Amendments Act (FISAAA), signed into law in July 2008, ruled U.S. District Court Chief Judge Vaughn R. Walker in a 46-page opinion.

Obama Says He Will Name National Cybersecurity Adviser

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Interesting article. Do you agree that such a position needs to be created? Will the official have enough of a technology clue to make the right decisions?President Obama used a White House speech yesterday to try to raise national concern about threats to computer networks, drawing praise from some industry executives and lawmakers but criticism from others who said his initiatives do not go far enough.

U.S. Cyberattack Console Aims to Turn Grunts into Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Don't tools like this already exist on the Internet and through open source that enable script kiddies to launch an attack? The U.S. military is putting together a suite of hacking tools that could one day make breaking into networks as easy for the average grunt as kicking down a door. That

Pirate Bay Money Squeeze Rejected by Court

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The request from four major record labels to fine the Pirate Bay operators for every day the site remains up and running was declined by the Swedish District Court today. Contrary to what the labels had requested, the court said it wants to hear the defendants before it will take any action.

Cybercrime and Punishment: Sentencing Panel Discards Proxy Penalty

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. government has dropped -- for now -- a plan to classify the use of "proxy" servers as evidence of sophistication in committing a crime. Proxy servers are computers that disguise the source of Internet traffic. They are commonly used for legitimate purposes, like evading Internet censors and working from home. However, they can also be used to hide from law enforcement. The U.S. Sentencing Commission was considering a change to federal sentencing guidelines that would have increased sentences by about 25 percent for people convicted of crimes in which proxies are used.

Questioning Security Certifications

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A pretty good read: So we can't help but wonder: What is the point of certification? How can federal agencies ensure that their cybersecurity staffers, and their contractors' staff, have the right skill sets? What do you think?

Linux Secure Enough for Iran

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Too funny (or scary, depending on your point-of-view). Apparently Iran thinks so poorly of Microsoft Windows they won't even use it. "Secondly, Microsoft software has a lot of backdoors and security weaknesses that are always being patched, so it is not secure. We are also under US sanctions. All this makes us think we need an alternative operating system."

Indictments in Kentucky Voting Fraud Case

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While not specifically related to "Linux Security" I came across this news late last week and would like to share it here. I am amazed -- and appalled -- that this story is not getting more (any) national coverage: According to the indictment, these alleged criminal actions affected the outcome of federal, local, and state primary and general elections in 2002, 2004, and 2006. You read that right: this is exactly the type of voting fraud that many of the experts, such as Bruce Schneier, have been talking about for years. It's no longer theory, it's practical and has actually affected the outcome of elections. With that being said, where is the national outrage? Sure it was only state- and local-level elections in Kentucky, but now that we see vulnerabilities in these electronic voting machines being used in real life, how do we know for sure it's not affecting us in our state?

Moving Infosec Responsibilities To The White House

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A good idea? Forthcoming legislation would wrest cybersecurity responsibilities from the U.S. Department of Homeland Security and transfer them to the White House, a proposed move that likely will draw objections from industry groups and some conservatives.

FBI Issues Warning Over VoIP Scammers Hijacking Asterisk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI is advising users of the open source VoIP package Asterisk to upgrade to the latest version, but has so far provided very little evidence on what vulnerability it has detected. The FBI's warning as published at the Internet Crime Complaint Center (IC3) is vague at best. The warning states: "The recent attacks were conducted by hackers exploiting a security vulnerability in Asterisk software. Asterisk is free and widely used software developed to integrate PBXii systems with Voice over Internet Protocol (VoIP), digital Internet voice calling services; however, early versions of the Asterisk software are known to have a vulnerability." Do you use Asterisk for your VoIP? If so you might want to upgrade to the latest version because the FBI stated that they have found an vulnerability in the earlier versions of the software.

Cyber-Attack on Defense Department Computers Raises Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reporting from Washington -- Senior military leaders took the exceptional step of briefing President Bush this week on a severe and widespread electronic attack on Defense Department computers that may have originated in Russia -- an incursion that posed unusual concern among commanders and raised potential implications for national security. Linux Security and/or World Security? What should be focused? What are your thoughts on this cyber attack after the recent Mumbai attack. This article talks about the cyber security breach on military networks and discuss the software agent.bz for the consequences. Read on for more information.