Government - Page 49

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

DOD Issues More IA Instructions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Pentagon recently issued the second part of its information assurance (IA) policy that sets guidelines on using Defense Department networks. DOD Instruction 8500.2 sets forth implementation of the rules and policies in Directive 8500.1, which was issued in late . . .

Feds Confiscate Illegal Domain Names

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal police have adopted a novel crime-fighting tactic: seizing control of domain names for Web sites that allegedly violate the law. Attorney General John Ashcroft said Monday that the domain names for several Web sites allegedly set up to sell . . .

DOD Wireless Policy Delayed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Defense Department's policy on the use of wireless devices, originally due out this week, will not be available until sometime in March or April, according to Defense officials. The policy, currently in draft form and collecting comments from those . . .

U.S. Information Security Law, Part One

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Information security professionals work within an enterprise to protect it from all non-physical threats to the integrity and availability of its data and systems. Performing this function draws security professionals into simultaneous, ongoing relationships between the enterprise on the one hand . . .

The New War on Cybercrime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. government has been quietly taking some giant steps forward over the past few weeks in the fight against cybercrime. But just how serious are the feds in tracking and punishing those who perpetrate crimes online? . . .

Man who exposed county's wireless insecurity found innocent

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Chiller submits, A Texas jury has acquitted a computer security analyst who last year was accused of wrongful access to a county computer network. In March of 2002, Stefan Puffer discovered that the Harris County district clerk's wireless computer network was unprotected. Anyone with a wireless network card had the ability to gain access to sensitive computers and files.. . .

Pentagon Thwarts Spoofed E-Mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Pentagon said today that an attempt to send a virus through its systems last week was thwarted before damage could be caused. On the morning of Feb. 14, someone "spoofed" the Defense Technology Information Center (DTIC) header, camouflaging the . . .

U.S. Plans for Online Defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. government has asked Internet users and businesses to practice "safe computing" online and promised to bolster its own cyber-defenses in a much- anticipated online security plan released Friday. More than a year in the making, the National Strategy . . .

Bush Unveils Final Cybersecurity Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration signed off Friday on the final version of the United States' strategy for protecting the Internet and securing information systems. The policy statement, called the National Strategy to Secure Cyberspace, calls for the government to work with . . .

FBI Issues Cyberattack Advisory

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI's cybersecurity arm is warning that the imminent threat of war with Iraq and escalating tensions with North Korea could lead to increased attacks against U.S. networks. "Recent experience has shown that during a time of increased international tension, . . .

Taking Byte from Baghdad

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although President Bush hasn't made a final decision about going to war with Iraq, preparations for that potential conflict are almost complete. Thousands of American troops have been deployed to the Middle East in recent weeks, along with dozens of warships . . .

Cyber-Security Plan Counts on Private Sector Input

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The forthcoming final version of the National Strategy to Secure Cyberspace will call for a comprehensive cybersecurity response system that will depend heavily on contributions from the private sector. The system, as described in the most recent draft of the document, . . .

Bush orders Cyberwarfare Plans

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Bush has ordered the government to draw up guidelines for cyberattacks against enemy computer networks, according to a report published Friday. Bush signed a directive last July ordering the government to develop, for the first time, rules for deciding when and how the United States would penetrate and disrupt foreign computer systems. . .

Europe Plans Cyber-Security Agency

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The European Commission is set to announce Europe's first cyber-security agency. Proposals will be published on Monday for a European network and information security agency, which the Commission hopes will raise levels of IT security and act as a central . . .

Feds Pull Suspicious .gov Site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a move that raises questions about the security of governmental domains, the Bush administration has pulled the plug on a .gov Web site pending an investigation into the authenticity of the organization that controlled it. . .

DOD Requests $380 Billion Budget

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Bush is requesting $379.9 billion in the fiscal 2004 budget for the Defense Department, including more than $24 billion focused on the DOD's information technology-laden transformation systems and initiatives. The fiscal 2004 request is more than $15 billion greater . . .

Bush Approves Cybersecurity Strategy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Bush has approved the White House's long-awaited national cybersecurity strategy, a landmark document intended to guide government and industry efforts to protect the nation's most critical information systems from cyberattack. . .