Items Tagged with "National Security"


7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DOD: Key to Cyber Defense is Highly Skilled People

July 31, 2012 Added by:Headlines

Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...

Comments  (1)

54a9b7b662bfb0f0445d1661d7ed180b

All is Fair in Love and Cyber War

July 27, 2012 Added by:Jayson Wylie

Whether it is financial fraud, economic damage, R&D or Intellectual property loss, espionage for a competitive edge or turning the centrifuges on high, these are all instances of code that cause damage, and it’s too late to say who started it...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Challenges National Security Letter Statute

July 22, 2012 Added by:Electronic Frontier Foundation

Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Revised Cybersecurity Act of 2012

July 20, 2012

"Critical infrastructure is increasingly vulnerable to cyber threats... The destruction or exploitation of critical infrastructure through a cyber attack, whether a nuclear power plant, a region’s water supply, or a major financial market, could cripple our economy, our national security... We must act now..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Air Force's Tactical Cyber Wing Gets New Commander

July 17, 2012 Added by:Headlines

The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Government Agencies Gain Emergency Internet Control

July 16, 2012 Added by:Stefano Mele

"Survivability, resilient, enduring, and effective communications, both domestic and international, are essential to enable the executive branch to communicate... Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies, and improve national resilience..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Government Strategies to Mitigate Growing Cyber Threats

July 16, 2012 Added by:Pierluigi Paganini

We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO: Aligning Electronic and Cyber Warfare Operations

July 16, 2012

DOD has taken steps to address a critical electronic warfare management gap, but it has not established a departmentwide governance framework for electronic warfare. DOD’s oversight of electronic warfare capabilities may be further complicated by its evolving relationship with computer network operations...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Cyber Attacks: Protecting National Infrastructure

July 15, 2012 Added by:Ben Rothke

Protecting “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters”...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Chief: Cyber Presents Opportunities and Challenges

July 11, 2012 Added by:Headlines

“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage and the Greatest Transfer of Wealth in History

July 10, 2012 Added by:Headlines

"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »