Government - Page 70

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

US cyber terrorism plan 'flawed'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration has admitted that its plan to combat the threat of cyber terrorism through industry self-regulation is flawed, and companies may be encouraging more restrictive security regulations by declining to work with the Federal Government. Richard Clarke, the . . .

White House plans to overhaul computer security plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration's approach to computer security will focus on realigning federal agencies' responsibilities for their own computer networks before revising the national plan that details how the government and the private sector should work together to combat threats from hackers . . .

NIST launching security review

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute of Standards and Technology next month will begin reviewing agency security programs and practices as part of an initiative started by the Clinton administration. The NIST Computer Security Expert Assist Team (CSEAT) is a group established to help . . .

Congress has hard time stomaching e-mail spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The United States government has been expected to crack down this year on spam -- unsolicited commercial e-mail. But a tough anti-spam bill is faltering in the House and even a milder Senate version faces plenty of opposition. . . .

White House prepares cyber-security plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House said it is kicking into high-gear a new version of the National Plan for Cyberspace Security and Critical Infrastructure Protection, which it said will be ready for action later this year. The White House said that the Commerce . . .

FBI employs bogus company to snare hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Far from a failed startup, the aptly named Invita turned out to be a bogus company set up by the Federal Bureau of Investigation to ensnare a pair of young Russian hackers accused of breaking into U.S. Internet companies' computers, stealing financial and other sensitive data and demanding extortion payments.. . .

Experts grapple with cyber security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Richard Clarke, senior director of the National Security Council, this morning at Gartner's Spring Symposium/ITxpo outlined the gist of a White House statement calling for the government to prepare a new national plan to protect cyberspace. This plan, he said, will . . .

New documents disclose extent of FBI's Web surveillance

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI has used Internet eavesdropping tools to track fugitives, drug dealers, extortionists, computer hackers and suspected foreign intelligence agents, documents show. The documents, obtained by The Associated Press under the Freedom of Information Act, also detail how the FBI scurried . . .

NSA Adviser Says Cyber-Assaults On Pentagon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A series of sophisticated attempts to break into Pentagon computers has continued for more than three years, and an extensive investigation has produced "disturbingly few clues" about who is responsible, according to a member of the National Security Agency's advisory board.. . .

Denmark plans to legalize music downloading

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Danish government is preparing a law that will legalize the downloading of music from the Internet, a government spokesman confirmed, angering copyright holders. Elsebeth Nielsen, the Danish Minister for Culture, wants to relax the country's private copying law.. . .

FBI Details Carnivore Use

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI has used Internet eavesdropping tools to track fugitives, drug dealers, extortionists, computer hackers and suspected foreign intelligence agents, documents show. The documents, obtained by The Associated Press under the Freedom of Information Act, also detail how the FBI scurried . . .

Cybercrime Treaty Underway

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Cybercrime Treaty is an international law enforcement regime that makes it easier for prosecuting countries to get evidence from abroad and to extradite and prosecute foreign nationals for certain kinds of crimes. The treaty has three primary sets of provisions. . . .

DVD Decoder is Terrorware

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To the U.S. government, a DVD descrambling utility is akin to terrorware that could crash airplanes, disrupt hospital equipment and imperil human lives. On Tuesday, an assistant U.S. attorney told a federal appeals court hearing arguments in the Universal Studios v. . . .

DeCSS code-crack dispute back in court

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The film industry and a hacker publication will head back into court Tuesday in the DeCSS case, a legal dispute that could dictate whether it's legal to publish or link to certain materials online.. . .

Feds' Math Is Fuzzy on Computer Crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The federal government can report in exacting detail the number of bank robberies committed in any given year. But when it comes to computer crimes against government agencies, it's close to clueless. Government officials estimate that only 20% of computer crime . . .

Cybercops are go!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Home Secretary Jack Straw has officially launched the National Hi-Tech Crime Unit today at the Science Museum in London. The unit and its £25 million of funding was announced in November last year as part of Mr Straw's clampdown on cybercrime. . . .