Blog Posts Tagged with "Government"

69dafe8b58066478aea48f3d0f384820

NSA Seeks Solutions for Secure Mobile Capabilities

July 23, 2012 Added by:Headlines

“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Challenges National Security Letter Statute

July 22, 2012 Added by:Electronic Frontier Foundation

Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force's Tactical Cyber Wing Gets New Commander

July 17, 2012 Added by:Headlines

The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Government Strategies to Mitigate Growing Cyber Threats

July 16, 2012 Added by:Pierluigi Paganini

We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Netherlands to Establish Mandatory Breach Notification

July 11, 2012 Added by:Matthijs R. Koot

In 2012, Netherlands will establish mandatory breach notification for vital sectors, giving the government increasing sectoral intervention possibilities. This includes the authority to obtain information, administrative enforcement of designations and the authority to appoint an officer on behalf of the government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Cyber Teams Uncover Federal Network Vulnerabilities

July 11, 2012 Added by:Headlines

"We provide free specialized access to skills and services that are not readily available or are in high demand across the dot-gov to promote a healthy and resilient cyber infrastructure. That's the goal to do risk-based analysis and gap analysis of capabilities and drive improvements..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Chief: Cyber Presents Opportunities and Challenges

July 11, 2012 Added by:Headlines

“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Homeland Security Enhances Cybersecurity Team

July 09, 2012 Added by:Headlines

"These new members of our vast cybersecurity team bring a wide array of experience and skills. Building on the successes of our strong and robust team, we are taking the DHS cybersecurity program to new levels that will ultimately enhance the security and safety of our nation..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Internet Users Again Shut Out of Secret TPP Negotiations

July 05, 2012 Added by:Electronic Frontier Foundation

We don’t know what’s in the current version of the TPP’s IP chapter - the public has only seen a leaked version. Given what we've seen in this leak, we have every right to be furious that representatives are negotiating an agreement that will harm online expression, privacy, and innovation on the Internet...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Cyber Crime: Government vs. Bitcoin Anonymity

June 28, 2012 Added by:gaToMaLo r. amores

For anonymous transactions to be possible through Bitcoin, a mixing system must be used. There are two types: Those secure against attack from people viewing the public transaction like Bitcoin Laundry, and those secure against attack from the mixing system itself, like Open Transactions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Unveils Trusted Purchasing Alliance

June 28, 2012 Added by:Headlines

“The mission of the Alliance is to maximize buying power to improve the cyber security posture of governments and not-for-profits... to help organizations in the public sector procure solutions to address cyber security... [a] trusted environment public sector organizations can turn to for expert guidance..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Government Insists It Can’t Be Sued Over Warrantless Wiretapping

June 26, 2012 Added by:Electronic Frontier Foundation

In three separate lawsuits that have been churning in the federal courts, the government has used a menu of dodges to block the courts from considering the key underlying question — have they been breaking the law and violating the constitution by warrantlessly surveilling American citizens — over and over again...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »