Items Tagged with "National Security"
August 08, 2012 Added by:Scot Terban
The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?
August 06, 2012 Added by:Headlines
The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...
August 02, 2012 Added by:Bill Mathews
General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?
August 01, 2012 Added by:Electronic Frontier Foundation
Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...
July 31, 2012 Added by:Headlines
Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...
July 27, 2012 Added by:Jayson Wylie
Whether it is financial fraud, economic damage, R&D or Intellectual property loss, espionage for a competitive edge or turning the centrifuges on high, these are all instances of code that cause damage, and it’s too late to say who started it...
July 22, 2012 Added by:Electronic Frontier Foundation
Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...
July 20, 2012 Added by:Stefano Mele
"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."
July 20, 2012
"Critical infrastructure is increasingly vulnerable to cyber threats... The destruction or exploitation of critical infrastructure through a cyber attack, whether a nuclear power plant, a region’s water supply, or a major financial market, could cripple our economy, our national security... We must act now..."
July 17, 2012 Added by:Headlines
The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...
July 16, 2012 Added by:Stefano Mele
"Survivability, resilient, enduring, and effective communications, both domestic and international, are essential to enable the executive branch to communicate... Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies, and improve national resilience..."
July 16, 2012 Added by:Pierluigi Paganini
We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?
July 16, 2012
DOD has taken steps to address a critical electronic warfare management gap, but it has not established a departmentwide governance framework for electronic warfare. DOD’s oversight of electronic warfare capabilities may be further complicated by its evolving relationship with computer network operations...
July 15, 2012 Added by:Ben Rothke
Protecting “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters”...
July 11, 2012 Added by:Headlines
“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”
July 10, 2012 Added by:Headlines
"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."