Keyword: cybersecurity

Brevity: Headers | « Text »
  • FICTITIOUS FEMME FATALE FOOLED CYBERSECURITY Intel, Defense Specialists Fell For Ruse in Test

    07/24/2010 12:21:50 AM PDT · by Cindy · 4 replies
    WASHINGTON TIMES.com ^ | 8:07 p.m., Sunday, July 18, 2010 | By Shaun Waterman
    SNIPPET: "But Robin Sage did not exist. Her profile was a ruse set up by security consultant Thomas Ryan as part of an effort to expose weaknesses in the nation's defense and intelligence communities - what Mr. Ryan calls "an independent 'red team' exercise."" SNIPPET: "Another person involved at a senior level in the U.S. military's cybersecurity efforts, who asked for anonymity because he was not authorized to speak about the case, called it "an object lesson in the dangers of social networking." "People feel they are safe" on the Internet, he said, but in reality, "it is a perfect...
  • A Bad Bill: “Protecting Cyberspace As National Asset Act”

    07/01/2010 3:31:39 PM PDT · by craigs2040 · 5 replies
    craigs2040 ^ | 7/1/10 | craigs2040
    The U.S. Congress is considering legislation entitled Protecting Cyberspace as a National Asset Act of 2010. There is a version in the House and Senate. The Senate’s is moving along, sponsored by Joe Lieberman (I-CT) and is cosponsored by Republican Susan Collins (R-ME). This proposed bill is intended to protect U.S. citizens from cyber attacks, but I argue that is intended to partially scare citizens and is littered with flaws. Largely, I find Jeffrey Carr’s summary of Forbes.com to be accurate. The bill creates the “White House Office for Cyberspace Policy” and a “National Center for Cyber-security and Communications.” These...
  • A Bad Bill: Protecting Cyberspace As A National Asset

    The U.S. Congress is considering legislation entitled Protecting Cyberspace as a National Asset Act of 2010. There is a version in the House and Senate. The Senate’s is moving along, sponsored by Joe Lieberman (I-CT) and is cosponsored by Republican Susan Collins (R-ME). This proposed bill is intended to protect U.S. citizens from cyber attacks, but I argue that is intended to partially scare citizens and is littered with flaws. Largely, I find Jeffrey Carr’s summary of Forbes.com to be accurate. The bill creates the “White House Office for Cyberspace Policy” and a “National Center for Cyber-security and Communications.” These...
  • Obama Internet kill switch plan approved by US Senate (Committee)

    06/26/2010 10:03:14 AM PDT · by EternalVigilance · 97 replies
    Tech World ^ | June 25, 2010 | Grant Gross
    A US Senate committee has approved a wide-ranging cybersecurity bill that some critics have suggested would give the US president the authority to shut down parts of the Internet during a cyberattack. Senator Joe Lieberman and other bill sponsors have refuted the charges that the Protecting Cyberspace as a National Asset Act gives the president an Internet "kill switch." Instead, the bill puts limits on the powers the president already has to cause "the closing of any facility or stations for wire communication" in a time of war, as described in the Communications Act of 1934, they said in a...
  • Bill Would Put DHS in Charge of All Civilian Computer Networks (net neutrality on steroids)

    06/19/2010 3:07:31 AM PDT · by Halfmanhalfamazing · 53 replies · 2,022+ views
    National terror alert ^ | June 10th, 2010 | national
    New legislation expected to be introduced today would give the Homeland Security Department broad new authorities and powers over federal civilian networks. The bill, however, does not include a “kill switch” for private sector networks, as widely reported previously. The legislation, Protecting Cyberspace as a National Asset Act of 2010, sponsored by Sens. Joseph Lieberman (I-Conn.), Susan Collins (R-Maine) and Tom Carper (D-Del.), would move the responsibility of civilian agency cybersecurity to DHS from the Office of Management and Budget, according to a summary of the bill obtained by Federal News Radio. The responsibility to develop, oversee and enforce IT...
  • US Finally Catching Up on Cyber Defense

    06/15/2010 5:06:35 PM PDT · by re_tail20 · 2 replies · 222+ views
    Newsmax ^ | June 4, 2010 | Arnaud De Borchgrave
    He speaks nine languages, taught himself Icelandic in a week and invented his own language he calls Manti. The 31-year-old autistic savant does complex celestial computations in seconds, sees hundreds of numbers on a blackboard once and can recite them in the correct sequence minutes later. Daniel Tammet possesses synesthesia. Not only does he see numbers but also feels them. He is one in hundreds of millions, as he demonstrated on ABC's "20/20" this week. But when the "singularity" arrives — that moment in history when the supercomputer capable of trillions of moves per second will have reached parity with...
  • The next 9/11 could be in cyberspace

    06/11/2010 7:28:44 PM PDT · by Eyes Unclouded · 18 replies · 417+ views
    International Business Times ^ | June 10, 2010 | Joseph Picard
    That's the warning from federal lawmakers who today introduced a bill to prevent a catastrophic cyber attack upon a power grid or the banking system from ever happening, and to defend against a multitude of other, perhaps less devastating cyber assaults against the government, the businesses and the people of the United States. "The threat of a cyber attack is very real," said Senator Susan Collins (R-ME), at a press conference introducing the Protecting Cyberspace as a National Asset Act of 2010, a bill she co-sponsored with Senators Joe Lieberman (I-CT) and Thomas Carper (D-DE). "We cannot wait for a...
  • Leaders to discuss cybersecurity threats

    05/05/2010 5:47:35 PM PDT · by myknowledge · 4 replies · 191+ views
    Nine News ^ | May 6, 2010 | Chris Lefkow
    Government officials and business leaders from around the world will discuss the growing threat to cybersecurity, at a three-day meeting in Texas. The Worldwide Cybersecurity Summit, hosted by the EastWest Institute (EWI), opens in Dallas on Monday and will feature discussions on ways to protect the world's digital infrastructure from electronic threats. The summit is being held following sophisticated cyberattacks on Google which the internet giant said originated in China. US President Barack Obama's National Security Adviser James Jones and White House cybersecurity co-ordinator Howard Schmidt are expected to address the summit. The EWI, a non-partisan think tank, is bringing...
  • Palin Testifies At E-Mail Hacking Trial

    04/23/2010 1:05:02 PM PDT · by speciallybland · 70 replies · 1,988+ views
    NPR ^ | 04/23/2010
    Sarah Palin testified Friday against a 22-year-old man accused of hacking into her e-mail account, saying later it's up to the judge to decide whether he should serve prison time if convicted. Palin testified that the hacking compromised one of the main ways she communicated with her family back in Alaska as she campaigned in 2008 as the Republican vice presidential candidate. Outside the courthouse, when asked whether she thought community service was punishment enough rather than prison, she said, "That's up to the judge." Former University of Tennessee student David Kernell faces up to 50 years in federal prison...
  • Hordes of Honkers Out To Raise Hell

    04/04/2010 9:16:46 PM PDT · by myknowledge · 11 replies · 553+ views
    Strategy Page ^ | April 4, 2010
    Many nations are taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking skills. This enables the government to use (often informally) these thousands of hackers to attack enemies (foreign or domestic.) These organizations arrange training and mentoring to improve the skills of group members. Turkey has over 44,000 of these hackers, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more...
  • Senate panel passes Cybersecurity Act with revised "kill switch" language

    03/31/2010 7:35:55 AM PDT · by Señor Zorro · 24 replies · 537+ views
    OpenCongress ^ | 2010-03-29 | Donny Shaw
    Last April, Sen. Jay Rockefeller [D, WV] (pictured at right), the Chairman of the Commerce, Science and Transportation Committee, introduced the Cybersecurity Act of 2009 to his committee. The goal of the bill was to develop a public-private plan for strengthening national security in the case of internet-based attacks. But it stalled almost immediately because of a controversial provision that would have give the President unilateral authority to declare a cybersecurity emergency and then shut down or limit access to parts of the internet without any oversight or explanation. A couple weeks ago, Sen. Rockefeller partnered with Sen. Olympia Snowe...
  • Training the next Cyber Warriors

    03/27/2010 4:09:03 AM PDT · by sodpoodle · 2 replies · 150+ views
    Fox news ^ | March 26, 2010 | Adam Housley
    By some estimates we will need nearly 60,000 newly trained cyber defense warriors (as they are called), just in the next 3 years to help stop the threats to U.S. interests, companies and friends around the globe. That number is staggering when you realize that much of the hacking that exists today is unknown. For example, for every hacker like Francois who clearly wants to be known, there are hundreds who want to do just the opposite....they just want to sneak in, get the info and then sneak out......never detected.
  • Internet Crime Losses Doubled In 2009

    03/12/2010 12:05:52 PM PST · by Slyscribe · 3 replies · 140+ views
    IBD's Click ^ | 3/12/2010 | Mike Krey
    Internet crime’s always been a problem, of course, but the magnitude of the problem has taken a big leap. The Internet Crime Complaint Center, a partnership of the National While Collar Crime Center and the FBI, today presented its annual report, and it’s a doozy. The dollar loss associated with Internet crime complaints received by IC3 last year jumped to $559.7 million from $264.6 million in 2008. That’s a 112% increase.
  • Nuke hack attack puts military on high alert (Fake report over govt systems Okinawa nuked)

    03/09/2010 12:42:45 AM PST · by tlb · 20 replies · 352+ views
    WorldNetDaily ^ | March 08, 2010 | Mike Maloof
    WASHINGTON, D.C. – A message that North Korea had conducted a nuclear attack on the Japanese island of Okinawa turned out to be false, but the fact it was delivered via U.S. military communications has prompted a high alert, according to U.S. officials who asked to remain anonymous. U.S. military channels were hacked either by the Chinese or North Koreans, the source said. Access to such communications – even unclassified military systems – suggests a serious breach of technology security. "Today, March 06, 2010 at 11.46 AM local time (UTC/GMT -5 hours),US seismographic stations recorded seismic activity in the area...
  • Cybersecurity: Progress Made but Challenges Remain...

    03/06/2010 1:30:35 PM PST · by Cindy · 2 replies · 154+ views
    Note: This is a SNIPPET only. Quote: GAO U.S. GOVERNMENT ACCOUNTABILITY OFFICE http://gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative" GAO-10-338 March 5, 2010 SNIPPET: "Summary In response to the ongoing threats to federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative (CNCI) in 2008. This initiative consists of a set of projects aimed at reducing vulnerabilities, protecting against intrusions, and anticipating future threats. GAO was asked to determine (1) what actions have been taken to develop interagency mechanisms to plan and coordinate CNCI activities and...
  • White House declassifies secretive cyber-security plan

    03/05/2010 10:49:08 PM PST · by Jet Jaguar · 5 replies · 387+ views
    SFgate.com ^ | March 3, 2010 | By: Alejandro Martinez-Cabrera
    Security experts often stress the urgency and importance of stronger collaboration between the private and public sectors if we hope to turn the tide against the growing number of cyber-threats on the nation's economy and security. So many were happy to hear the Obama administration's top cyber-security official, Howard Schmidt, say in one of his first public addresses since he took the job last year that improving these partnerships will be a priority of his office. And to that effect, Schmidt's office declassified today some of the Comprehensive National Cybersecurity Initiative documents, a secretive plan drafted by the Bush administration...
  • Cyber warriors gather as online battles rage

    03/01/2010 12:59:04 AM PST · by xtinct · 28 replies · 1,807+ views
    Space War ^ | 2/28/10 | Staff Writers
    US national security leaders and top cyber warriors from around the world are gathering here to plot defenses against criminals and spies that increasingly plague the Internet. Homeland Security Secretary Janet Napolitano and White House Cyber Security Coordinator Howard Schmidt will take part in this week's RSA conference along with computer defense companies and technology icons such as Apple co-founder Steve Wozniak and Craigslist creator Craig Newmark. "We have before us more data moving into the cloud and more sophisticated cyber criminals," said Qualys chief executive Philippe Courtot, who is among the keynote speakers at the premier event that kicks...
  • White House declassifies parts of US cybersecurity plan

    03/02/2010 11:41:55 PM PST · by UAConservative · 4 replies · 401+ views
    CS Monitor ^ | March 2, 2010 | Michael B. Farrell
    On Tuesday, the White House declassified cybersecurity somewhat when cybersecurity czar Howard Schmidt pulled back the curtain, at least a bit, on the Bush administration’s secretive plan to defend the nation’s computer networks. At the RSA Conference, a security industry event, in San Francisco Tuesday, Mr. Schmidt announced that the Obama administration was partially declassifying the 2008 Comprehensive National Cybersecurity Initiative (CNCI) in the name of transparency. “Transparency is particularly vital in areas, such as the CNCI, where there have been legitimate questions about sensitive topics like the role of the intelligence community in cybersecurity,” said Schmidt in a statement...
  • WH declassifies excerpts from Bush-era cybersecurity report

    03/02/2010 2:14:36 PM PST · by Nachum · 1 replies · 298+ views
    The Hill ^ | 3/2/10 | Tony Romm
    The White House on Tuesday made public excerpts of a previously classified report on cybersecurity prepared by the Bush adminisration. The report prescribes that the president "establish a front line of defense" and better address emerging cybersecurity threats. It also calls on both White House officials and lawmakers to boost domestic Web security programs, especially with respect to the federal government's classified networks, while expanding cybersecurity research and education programs.
  • Cybersecurity bill to give president new emergency powers

    02/27/2010 4:22:36 AM PST · by RoadTest · 64 replies · 2,469+ views
    The Hill ^ | 02/26/10 02:30 PM ET | Tony Romm
    The president would have the power to safeguard essential federal and private Web resources under draft Senate cybersecurity legislation. According to an aide familiar with the proposal, the bill includes a mandate for federal agencies to prepare emergency response plans in the event of a massive, nationwide cyberattack. The president would then have the ability to initiate those network contingency plans to ensure key federal or private services did not go offline during a cyberattack of unprecedented scope, the aide said. Ultimately, the legislation is chiefly the brainchild of Sens. Jay Rockefeller (D-W.Va.) and Olympia Snowe (R-Maine), the chairman and...