Blog Posts Tagged with "National Security"


WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)


State Actors Develop Cyberweapons to Cripple Infrastructure

March 25, 2011 Added by:Dan Dieterle

“We believe that state actors have developed cyberweapons to cripple infrastructure targets in ways tantamount to kinetic assaults. Some of these weapons could potentially destroy hardware as well as data and software..."

Comments  (9)


Social Media and Lone Wolf Terror Attacks

March 17, 2011 Added by:Dan Dieterle

Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...

Comments  (2)


What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)


Cyberterrorism - As Seen On TV

March 01, 2011 Added by:J. Oquendo

The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...

Comments  (1)


Dutch Government to Design Cyber Defense Doctrine

February 27, 2011 Added by:Don Eijndhoven

Maj. General Koen Gijsbers spoke at the InfoSecurity convention in Utrecht in November, and his take on Cyber Warfare confirms a lot of what I previously posted. Regardless of budget cuts, the Dutch Department of Defense still wants to invest in the development of cyber warfare capabilities...

Comments  (0)


Senator Proposes New Cybersecurity Legislation

February 10, 2011 Added by:Headlines

"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...

Comments  (0)


Air Force General Urges Enhanced Cyber Deterrence

January 27, 2011 Added by:Headlines

“If we elect to use cybercapability to deter — and you don’t necessarily have to, you can use something else to deter bad cyberbehavior — [but] if we’re going to use cybercapabilities to deter, that’s going to beg for some demonstration of that capability..."

Comments  (0)


White House Scores Low on Cybersecurity Report Card

January 25, 2011 Added by:Headlines

The National Security Cyberspace Institute has released a report that examines the White House record on cybersecurity policy over the last two years. The grades earned are mediocre at best, and do not live up to the challenges facing cybersecurity in the wake of Aurora, Stuxnet, and WikiLeaks...

Comments  (0)


Congressman Wants WikiLeaks on Treasury Blacklist

January 14, 2011 Added by:Headlines

Blacklisting by the Treasury Department is equivalent to marking an individual or group on par with terrorist organizations, and would bar U.S. citizens and companies from doing business or providing any material support whatsoever for the rogue whistleblower organization...

Comments  (0)


USB Device Containing Military Secrets Missing

January 05, 2011 Added by:Headlines

A removable USB storage device, alleged to contain classified level-two U.S. military secrets, is missing in South Korea. The unit was first reported missing in July, but the Army officer responsible for the hardware falsely reported that he had located and then discarded the device...

Comments  (0)


DHS Asserts Agency's Leading Role in Cyber Security

December 21, 2010 Added by:Headlines

Cyberspace is fundamentally a civilian space. There are some who say cybersecurity should be left to the market, and there are some who characterize the Internet as a battlefield. Both the market and the battlefield analogies are the wrong ones to use...

Comments  (0)


Marine One Breach Has Winners and Losers

March 01, 2009 Added by:Anthony M. Freed

Billions of dollars are spent on security every year, and it can be trumped by one lapse in judgment. That is a tremendous amount of resources committed to security just to have it undermined by the whim of one individual, and it underscores the precariousness of secure systems...

Comments  (2)

Page « < 14 - 15 - 16 - 17 - 18 > »