Government - Page 29

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

FBI: Web fraud cost more than $200 million in 2006

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Male. Between 30 and 50 years old. Residing in California, Texas, Florida or New York. That's the most likely profile for a 2006 victim of web-based crime, according to a report from the FBI and the National White Collar Crime Center. The Internet Crime Complaint Center (IC3) processed 10 percent fewer cybercrime complaints last year than during 2005, according to the report. The amount of money lost, however, increased. The total dollar loss from all referred cases was more than $198 million for 2006, a $15 million increase from the year before.

Anti-spyware bill could mean tougher fines

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Supporters of the Spy Act hope that the bill's third time is a charm. On Thursday, the anti-spyware bill--which has twice passed the U.S. House of Representatives only to be rejected by the Senate--got its third hearing in the House Subcommittee on Commerce, Trade and Consumer Protection. The unwanted programs, in addition to stealing a victim's data, could also make an innocent PC user appear guilty of a crime. In Connecticut, a substitute teacher has been found guilty of four counts of risk of injury to a minor after her classroom PC started displaying pornographic pop-up ads. A forensic investigator working for the defense found that the computer had been significantly compromised by spyware programs, and security researchers have criticized the prosecution for not adequately investigating the digital evidence. The teacher is scheduled to be sentenced at the end of March.

U.N. agency: Internet Name System in Growing Danger

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet's key site identity system is in mounting danger from new techniques that could cause havoc by turning it into a free-for-all market, the World Intellectual Property Organization warned on Monday. And the United Nations' agency said the latest trends in registering top-level domain names (TLDs) could undermine dispute procedures under which patent holders can pursue "cybersquatters."

Feds Hope to Boost Business Role in Slowing Cyberattacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As reports of cybersecurity incidents grow, U.S. Department of Homeland Security officials plan to improve their ability to work on the problem face to face with private-sector experts. The DHS plans to collocate private-sector employees from the communications and IT industries with government workers at the U.S. Computer Emergency Readiness Team (US-CERT) facility here, said Gregory Garcia, assistant secretary of cybersecurity and telecommunications at the DHS.

HHS Should Lead on Health IT Privacy, Securit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Health and Human Services Department needs to exert stronger leadership in determining how to apply privacy to health IT initiatives. The agency is only in the early stages of privacy efforts and its plans are unclear, the Government Accountability Office said. HHS needs a comprehensive approach as part of its national strategy for health IT, including detailed plans, milestones and mechanisms to monitor the progress of privacy and other health IT developments, said David Powner, GAO

Companies Increasingly Reporting Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Corporate America is getting better about telling the U.S. government about serious security incidents, according to an official from the U.S. Department of Homeland Security (DHS). In 2006, companies, universities and government agencies reported 23,000 incidents to the U.S. Computer Emergency Readiness Team (US-CERT), up from 5,000 reported in 2005, Jerry Dixon, deputy director of the DHS's National Cyber Security Division (NCSD), said at the RSA Security Conference on Wednesday.

Feds' Tech Budgets May Hinge on Cybersecurity Prowess

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration may withhold technology dollars from federal agencies that are lagging on cybersecurity, a top IT official said Wednesday. The philosophy goes something like this: The government shouldn't be spending money on agencies that want to build new systems when their overall management processes remain flawed.

Archives Unveiling A National Cyber Alert System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS) unveiled the National Cyber Alert System, an operational system delivering to Americans timely and actionable information to better secure their computer systems. As part of this program, Homeland Security is making available a series of information products targeted for home users and technical experts in businesses and government agencies. These e-mail products will provide timely information on computer security vulnerabilities, potential impact, and action required to mitigate threats, as well as PC security

Two e-voting test labs get thumbs up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. federal agency in charge of government technology standards approved on Thursday the accreditation of two laboratories to perform certification of election computers. The National Institute of Standards and Technology (NIST) recommended that iBeta Quality Assurance and SysTest Labs be allowed to test election equipment under the current guidelines, the U.S. Election Assistance Commission (EAC) said on Thursday. If the EAC approves the recommendations, the two companies will be the first to receive credentials under the new Voting System Certification and Laboratory Accreditation Program.

U.S. Gov't To Use Full Disk Encryption On All Computers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On June 23, 2006 a Presidential Mandate was put in place requiring all agency laptops to fully encrypt data on the HDD. The U.S. Government is currently conducting the largest single side-by-side comparison and competition for the selection of a Full Disk Encryption product. The selected product will be deployed on Millions of computers in the U.S. federal government space. This implementation will end up being the largest single implementation ever, and all of the information regarding the competition is in the public domain. The evaluation will come to an end in 90 days. You can view all the vendors competing and list of requirements."

DOD bars use of HTML e-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Due to an increased network threat condition, the Defense Department is blocking all HTML-based e-mail messages and has banned the use of Outlook Web Access e-mail applications, according to a spokesman for the Joint Task Force for Global Network Operations. An internal message available on the Internet from the Defense Security Service (DSS) states that JTF-GNO raised the network threat condition from Information Condition 5, which indicates normal operating conditions, to Infocon 4 "in the face of continuing and sophisticated threats" against Defense Department networks.

And The Worst Security Idea of 2006 was . . .

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Once again it is time to take note of those security blunders from the past year that have given us so many opportunities to learn from our mistakes. It has been a year rich in opportunity, with one lesson in particular being repeatedly hammered home. So the second annual Bonehead Award for Notable Failures in IT Security goes to all of those people who think it is productive to carry around sensitive data on portable devices.

UK Computer Misuse Act could ban security tools

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new Police and Justice Act, published today, could criminalise legitimate IT security activity. There are fears amongst security experts that changes it makes to the Computer Misuse Act will make it illegal to distribute some vital tools. The new law modifies the Computer Misuse Act of 1990, the cornerstone of Britain's anti-hacking law. The changes make clear for the first time that denial of service attacks are an offence; but they also address the distribution of hacking tools. The new Act will make a person guilty of an offence "if he supplies or offers to supply any article believing that it is likely to be used to commit, or to assist in the commission of, [a hacking offence]." The word "article" is defined in the Act to include "any program or data held in electronic form".

IBM completes UK government Linux security testing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Questions in the House of Lords in June 2005 revealed that the Cabinet Office's Central Sponsor for Information Assurance unit was developing proof-of-concept systems using Security Enhance Linux to support remote working and web services. In May this year IBM revealed that it was involved in the project along with Red Hat, Tresys Technology, and Belmin Group.

Contractors Should Comply With DOD Security Training Rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Contractors who are serious about getting Defense Department contracts should make sure now that their employees who have information assurance roles meet the standards set by DOD Directive 8570.1, according to panelists who spoke this morning at an Information Technology Association of America event. "There's not a downside to contractors being certified," said Phyllis Scott, president of training firm TTSC. Contracts will require it, and contractors who are already certified will have an immediate advantage, she said.

UK Bans Denial of Service Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There had been concern that Britain's Computer Misuse Act, written in the days before the World Wide Web, allowed denial of service attacks to fall through a loophole. These are attacks in which a web or email server is deliberately flooded with information to the point of collapse. The 1990 legislation described an offence of doing anything with criminal intent "which causes an unauthorised modification of the contents of any computer"; the question was whether that covered denial of service attacks. When a court cleared teenager David Lennon in November 2005 on charges of sending five million emails to his former employer

US Customs Announces Massive New Database On Trucks And Travelers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

US Customs and Border Protection issued a notice in the Federal Register yesterday which detailed the agency's massive database that keeps risk assessments on every traveler entering or leaving the country. Citizens who are concerned that their information is inaccurate are all but out of luck: the system "may not be accessed under the Privacy Act for the purpose of contesting the content of the record." The system in question is the Automated Targeting System, which is associated with the previously-existing Treasury Enforcement Communications System. TECS was built to screen people and assets that moved in and out of the US, and its database contains more than one billion records that are accessible by more than 30,000 users at 1,800 sites around the country. Customs has adapted parts of the TECS system to its own use and now plans to screen all passengers, inbound and outbound cargo, and ships.