Government - Page 49
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Pentagon recently issued the second part of its information assurance (IA) policy that sets guidelines on using Defense Department networks. DOD Instruction 8500.2 sets forth implementation of the rules and policies in Directive 8500.1, which was issued in late . . .
Federal police have adopted a novel crime-fighting tactic: seizing control of domain names for Web sites that allegedly violate the law. Attorney General John Ashcroft said Monday that the domain names for several Web sites allegedly set up to sell . . .
The Defense Department's policy on the use of wireless devices, originally due out this week, will not be available until sometime in March or April, according to Defense officials. The policy, currently in draft form and collecting comments from those . . .
Information security professionals work within an enterprise to protect it from all non-physical threats to the integrity and availability of its data and systems. Performing this function draws security professionals into simultaneous, ongoing relationships between the enterprise on the one hand . . .
He was a Montreal-area teenager with a rudimentary knowledge of computer hacking, but he single-handedly crippled the lucrative U.S. e-commerce market for brief periods in February 2000. In the process, the 15-year-old nicknamed Mafiaboy provided the RCMP with its first and finest example of a high-tech cross-border investigation. . .
The U.S. government has been quietly taking some giant steps forward over the past few weeks in the fight against cybercrime. But just how serious are the feds in tracking and punishing those who perpetrate crimes online? . . .
The Chiller submits, A Texas jury has acquitted a computer security analyst who last year was accused of wrongful access to a county computer network. In March of 2002, Stefan Puffer discovered that the Harris County district clerk's wireless computer network was unprotected. Anyone with a wireless network card had the ability to gain access to sensitive computers and files.. . .
The Pentagon said today that an attempt to send a virus through its systems last week was thwarted before damage could be caused. On the morning of Feb. 14, someone "spoofed" the Defense Technology Information Center (DTIC) header, camouflaging the . . .
Civil liberties groups are using a long shot approach in an effort to get the Supreme Court to limit the government's power to spy, filing an appeal Tuesday on behalf of people who don't even know they're being monitored. . .
The U.S. government has asked Internet users and businesses to practice "safe computing" online and promised to bolster its own cyber-defenses in a much- anticipated online security plan released Friday. More than a year in the making, the National Strategy . . .
The Bush administration signed off Friday on the final version of the United States' strategy for protecting the Internet and securing information systems. The policy statement, called the National Strategy to Secure Cyberspace, calls for the government to work with . . .
The FBI's cybersecurity arm is warning that the imminent threat of war with Iraq and escalating tensions with North Korea could lead to increased attacks against U.S. networks. "Recent experience has shown that during a time of increased international tension, . . .
Imagine Saddam Hussein sitting in one of his palaces, tapping on his laptop, maybe shopping at Uranium Online. Which actually exists, by the way. Tag line: "The nuclear fuel e-commerce solution." . . .
Although President Bush hasn't made a final decision about going to war with Iraq, preparations for that potential conflict are almost complete. Thousands of American troops have been deployed to the Middle East in recent weeks, along with dozens of warships . . .
The forthcoming final version of the National Strategy to Secure Cyberspace will call for a comprehensive cybersecurity response system that will depend heavily on contributions from the private sector. The system, as described in the most recent draft of the document, . . .
President Bush has ordered the government to draw up guidelines for cyberattacks against enemy computer networks, according to a report published Friday. Bush signed a directive last July ordering the government to develop, for the first time, rules for deciding when and how the United States would penetrate and disrupt foreign computer systems. . .
The European Commission is set to announce Europe's first cyber-security agency. Proposals will be published on Monday for a European network and information security agency, which the Commission hopes will raise levels of IT security and act as a central . . .
In a move that raises questions about the security of governmental domains, the Bush administration has pulled the plug on a .gov Web site pending an investigation into the authenticity of the organization that controlled it. . .
President Bush is requesting $379.9 billion in the fiscal 2004 budget for the Defense Department, including more than $24 billion focused on the DOD's information technology-laden transformation systems and initiatives. The fiscal 2004 request is more than $15 billion greater . . .
President Bush has approved the White House's long-awaited national cybersecurity strategy, a landmark document intended to guide government and industry efforts to protect the nation's most critical information systems from cyberattack. . .