Government - Page 74

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Wired crimefighters

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Police in Boston had reached a dead end. They had a murder suspect, but not nearly enough evidence, and the investigation was growing cold. But a computer-trained ATF agent went undercover, and for once, used the Internet's anonymity to law enforcement's . . .

EFF asks court for relief in DVD encryption ban

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Electronic Frontier Foundation (EFF), an online civil liberties group, said it has petitioned a federal appeals court to overturn a lower court's interpretation of the Digital Millennium Copyright Act (DMCA). The group said in a statement that the . . .

Feds find pro-Napster hacker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Pimpshiz', the hacker who sprayed pro-Napster messages on hundreds of Web sites last year, may have been caught. US police raided the home of a 17-year-old last month after being tipped off by the FBI, a fact they confirmed to CNet . . .

Crime reporting website raises security fears

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Plans to let the public report crimes via a national police website have raised fears that citizens will be vulnerable to revenge attacks if computer security fails. Home Office minister Charles Clarke told the House of Commons this week that he . . .

U.S. government throws in towel on computerexport limits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House yesterday essentially threw in the towel on the government's ability to limit exports of high-performance computers, while also acknowledging that there's little the U.S. can do to prevent other nations from developing high-powered systems by harnessing computer power . . .

How to Spend a Dollar on Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A shy, spiky-haired 24-year-old reputedly unleashes a global computer virus causing an estimated $10 billion in damages, paralyzing computers from the Pentagon to the Parliament. Hackers spend six weeks peering at Microsoft's network programming code for a new generation of Microsoft . . .

Agencies crack down on e-mail 'spam'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of federal agencies is collaborating to crack down on unsolicited commercial e-mail. The Federal Trade Commission last Friday released the results of part of its "Project Mailbox IV," an effort by the FTC, the U.S. Postal Inspection Service, . . .

Hollywood, software groups push DoJ copyright busts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Music bootleggers and software crackers tired of wading through the entire United States Code to see if they're about to break the law, or incur daunting criminal liabilities in excess of the potential value of their planned activities, may now consult . . .

History Looks at the NSA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday . . .

NSA preps Spook Linux 0.1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The ultra-secretive US spy agency, the National Security Agency (NSA), has released a prototype for an ultra-secure version of the Linux operating system. Developed in co-operation with industry research partners, the prototype includes enhancements to Linux which provide stronger protection against . . .

FBI Plan: Cybercrime Info Sharing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI announced Friday the completion of a program that seeks to combat cybercrime by encouraging companies to share information about Internet attacks they have experienced. Participating companies and the FBI would use encrypted e-mail and a secure website to warn . . .

Congress to tackle Net taxes, privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In its new session that began this week, the U.S. Congress is facing two big high-tech issues: Internet taxes and online privacy. On the tax issue, in particular, the clock is ticking. The Internet tax moratorium act, which blocks new . . .

Washington E-Security Conference Paints Gloomy Picture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Information security is no longer about refining technology, but helping people and improving processes. This was the key theme of the recent Intermedia Group E-Security Conference and Exposition in Arlington, Va. The conference featured some of the most respected information security . . .

Bush Seen Likely to Overhaul E-Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As George W. Bush strides toward the White House, national security experts are preparing for what could be a major change in the way the government and the private sector organize to defend against cyber-attacks. Clinton administration officials and other national . . .

Digital assault against Pentagon rises

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The number of cyberattacks and intrusions into Pentagon computer networks this year is expected to top off at 24,000, an increase of 5 percent compared with last year, said the U.S. Department of Defense. However, the overwhelming majority of those intrusions . . .

Port scans are legal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A tiff between two IT contractors that spiralled into federal court ended last month with a US district court ruling in Georgia that port scans of a network do not damage it, in reference to a section of the anti-hacking laws . . .

Scholarship program for information security workers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new program provides scholarships for the study of information security to students in exchange for a two-year commitment to work for the federal government in the information security field. The scholarships support two years of study in information security at either the graduate or undergraduate level.. . .