Government - Page 31

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Update: US government lab offers grid computing toolkit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new open-source software toolkit is available Tuesday to improve remote online scientific collaboration via grid computing. The Access Grid Toolkit from the U.S. Department of Energy's Argonne National Laboratory enables development of programs to share video, audio, data and text for real-time collaboration between people at different locations around the world.

Why You Should Care About The RIP Act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You may be more accurate than you think. The Regulation of Investigatory Powers Act, to give it its full name, gives the police and the security services the right to intercept our communications data. Scary stuff indeed. But wasn't there a big scandal about this a while ago? That's right. RIPA, as it's affectionately known by some, was passed in October 2000, in the face of widespread opposition that nearly brought the bill down.

Weak spots still hamper DHS info security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite improvements, the Homeland Security Department continues to display significant information security weaknesses that jeopardize the integrity and privacy of department IT programs, according to a new report released by DHS Inspector General Richard Skinner.

Senate OKs Controversial Internet Treaty

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Senate Friday ratified an international treaty designed to ease investigation of cybercrime, but U.S. civil liberties groups say that signing the pact is a big mistake. The Council of Europe's Convention on Cybercrime, which began circulating in 2001, has been adopted by 41 other countries, including most of Europe as well as Canada and Japan. It is designed to harmonize laws on computer crime, which differ from country to country. Countries that sign the treaty agree to establish some common laws against criminal behavior online, such as attacks on computer networks, terrorist tactics, and exploitation of children. The language of the treaty is very broad and doesn't require the U.S. to write any new cybercrime laws.

BLACK HAT - FBI: Cybercriminals Taking Cues From Mafia

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Web site offered to sell stolen credit card information for US$100, but it was the title of the poster that caught FBI agent Thomas X Grasso Jr.'s attention. The cybercriminal identified himself as a "Capo di capo" -- a boss of bosses, in Mafia parlance. As money has become the driving force behind online threats, cyber criminals have been taking a page from organized crime, adopting the same kind of organizational structures as these older crime groups, Grasso told an audience Friday at the Defcon hacker conference. Defcon immediately follows Black Hat, its sister show.

FBI: Hackers Must Help Fight Web Mob

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI's point man for Internet crime wants hackers to join the fight against international gangs of Web mobsters. Dan Larkin, unit chief of the FBI's Internet Crime Complaint Center, used the spotlight of the Black Hat security conference here to call for a new level of trust and cooperation between security researchers and law enforcement, warning that online crime is being controlled by "very sophisticated, very organized" attackers.

Net Neutrality Primer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The net neutrality debate is divided into two camps: Fighting against net neutrality are the telecom companies and cable providers, who provide Internet access to consumers. Opposing them are content providers like Google, Amazon, and non-profits like MoveOn.org and the National Religious Broadcasters. But what are they fighting about?

Breach Rules Toughened For Federal Agencies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House's Office of Management and Budget instructed U.S. federal agencies to alert the US-CERT within one hour to any breach involving personally identifiable information, even if the possibility of a breach is only suspected. The memo (PDF), dated last week, is the fourth letter regarding information-security policy sent to government agencies in the past two months. Another memo (PDF), dated Monday, required that government agencies report any computer systems missing from their inventory and outline the results of an investigation into handling of personally identifiable information within their agency. An earlier memo mandated that agencies use encryption to protect sensitive data on laptops.

CSI survey: Data breaches still being swept under the rug

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On the surface, the results of the 11th annual CSI/FBI Computer Crime and Security Survey are positive, with fewer companies reporting financial loss from data breaches compared to last year. But a majority of companies are still reluctant to report security breaches to law enforcement, suggesting that the survey isn't capturing the full extent of the problem.

Cybersecurity still handled by a

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It was one year ago that Homeland Security secretary Michael Chertoff announced a departmental reorganization that would create an assistant secretary for cybersecurity and telecommunications.

US-Visit's RFID system needs better security, report says

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program's RFID system has not done enough to secure personal data stored in its Automated Identification Management System (AIDMS) database, according to a recent partially-censored report issued by Richard Skinner, the inspector general of the Department of Homeland Security. US-VISIT is a program established in 2004 by DHS to control and monitor the entry, visa status and exit of foreign visitors to the U.S.