Government - Page 40

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Justice Department Says It Can't Share Lobbying Data Because Computer System Will Crash

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Who knew? A new denial of service attacks for databases, based on copying from them:The Bush Administration (actually Justice Dept. --ed) is offering a novel reason for denying a request seeking the Justice Department's database on foreign lobbyists: Copying the information would bring down the computer system. "Implementing such a request risks a crash that cannot be fixed and could result in a major loss of data, which would be devastating," wrote Thomas J. McIntyre, chief in the Justice Department's office for information requests. . . .

Linux in Government: Open Source Innovation within the DoD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Prior to implementing an integrated software solution for its hospitals in 1993, the military experienced bottlenecks in its computer services. Each branch of the armed services used different legacy systems and manual procedures to control the flow of medical supplies and equipment, facilities, contractors and record keeping. Then, the Department of Defense (DoD) automated the processes with a common standard platform to conduct medical logistics for every branch of service. When you manage as many hospitals and health-care facilities as the military does, standards-based solutions and coordinated automation are essential. . . .

Feds urge secrecy over network outages

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Giving the public too many details about significant network service outages could present cyberterrorists with a "virtual road map" to targeting critical infrastructures, according to the US Department of Homeland Security, which this month urged regulators to keep such information secret."Ah, this must be more of the "increased security through decreased transparancy" theory. It meshes well with the "Terrorists are smart enough to look into telecom outage reports and expert enough to know how to use them, but somehow cannot otherwise determine what parts of our information infastructure might be vulnerable" theory. Two words, DoHS: "Root Servers". And I didn't even read one of those outage reports! . . .

Gambling on Voting

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If election officials want to convince voters that electronic voting can be trusted, they should be willing to make it at least as secure as slot machines. To appreciate how poor the oversight on voting systems is, it's useful to look at the way Nevada systematically ensures that electronic gambling machines in Las Vegas operate honestly and accurately. Electronic voting, by comparison, is rife with lax procedures, security risks and conflicts of interest. . . .

FDIC info security lacking, GAO finds

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Weaknesses in the Federal Deposit Insurance Corp.'s information systems place sensitive information at risk of unauthorized disclosure, disruption of operations or loss of assets, according to the General Accounting Office. . . .

Auditors warn of foreign risks to weapons software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Its hard to help wondering if this might give Green Hills Software just the boost they've been looking for. To quote from the article, "The Defense Department's control of the source of weapons software came under fire today in a report issued by the General Accounting Office, which said overseas production of software creates an unacceptable security environment." . . .

The Open Source Government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With open source, agencies wouldn't be tied to the whims of one software vendor; instead, a community of developers would control an open source project. Open source software may also attract government users because the code can be exchanged between agencies, which are all watching their budgets. . . .

HNS Learning Session: Introduction to Computer Forensics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For this learning session on Help Net Security, we've got Michael J. Staggs, Senior Security Engineer at Guidance Software, discussing the basics of computer forensics. In this twelve minute audio, Mr. Staggs introduces the listeners to computer forensics in general, the need and importance of forensics in the IT environment and gives a number of valuable tips regarding the process, including creating methodology guidelines, incident simulation and more. . . .

DMCA Revisions 'Legalize Hacking'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Called the Digital Media Consumers' Rights Act, the amendments are backed by librarians, liberal consumer groups and some technology firms. But they're bitterly opposed by the entertainment industry, including Hollywood, major record labels and the Business Software Alliance. . . .

DHS and UK ID card biometric vendor in false ID lawsuit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At San Jose Superior Court today (11 May) biometrics company Identix will seek to have a product liability and slander lawsuit against it and the States of California and Oregon dismissed. Plaintiffs Roger Benson and Miguel Espinoza are seeking restitution for the damage inflicted on them by duplication in police records which gave them other people's criminal records. . . .

Who Hacked the Voting System? The Teacher

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The fix was in, and it was devilishly hard to detect. Software within electronic voting machines had been corrupted with malicious code squirreled away in images on the touch screen. When activated with a specific series of voting choices, the rogue program would tip the results of a precinct toward a certain candidate. Then the program would disappear without a trace. . . .

Don't Strangle Businesses Before They're Born

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Probably someone reading this article is right now thinking up the killer app for RFID, the one that drives it into the mainstream. In 20 years we'll look back and say, "Hey, remember in 2004 we thought RFID was going to be used for inventory management? Wasn't that silly of us?" But that won't happen if RFID is strangled by government regulation before it's born. . . .

DHS, NSA team on cybersecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency and the Homeland Security Department will work together on educational initiatives to strengthen the country's computer infrastructure. On April 22, officials from NSA and DHS announced the formation of the National Centers of Academic Excellence in Information Assurance Education. It stems from NSA's Centers of Academic Excellence in Information Assurance Education Program, which started in 1998 and recognizes 50 universities in 26 states. . . .

MPs ponder whether 'benign' hacking should be legal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is what a liberal MP had to say: "If a successor to David Blunkett was going to introduce tough censorship laws on the use of the Internet in the UK, should someone be able to justify a hacking attack against the IT involved because they opposed that censorship?" This is a dangerous trend, folks. . . .

DOD decentralizes Wi-Fi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Defense Department's new wireless fidelity policy seeks help from many of its agencies to ensure their employees and contractors use caution when operating wireless computer devices at military installations. The chief information officer and DOD's Office of Networks and Information Integration (NI2) oversee and monitor the new Wi-Fi policy. But the undersecretary of Defense for Intelligence, the Chairman of the Joint Chiefs of Staff, the U.S. Strategic Command, the Defense Information Systems Agency and department staff officials all get roles in the new policy. . . .

U.S. defends cybercrime treaty

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

he treaty is open to any country, with the approval of those that have already ratified it, and some fear that it could put the United States' surveillance capabilities at the disposal of foreign governments with poor human rights records, who may be investigating actions that are not considered crimes elsewhere. . . .

Last part of security strategy released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A cybersecurity task force recommended improvements today to a variety of technical standards and practices. Organized by the National Cyber Security Partnership, the task force issued a 104-page report with recommendations for the federal government and industry. The report is the last of five documents prepared by industry and academic experts on the President's National Strategy to Secure Cyberspace, a general blueprint for improving the nation's cybersecurity readiness. . . .

Could open source elections close out hanging chads?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When Joe Church contemplated trudging out in the Canada cold to cast a vote for relatively minor and in some cases unopposed local candidates, the IT veteran did what any Canuck computing geek would -- he set out to build an alternative, electronic voting system. . . .