• Civilian cyber-warriors not motivated by patriotism

    Cybercrimes pose a huge societal risk and have become a hot issue globally, yet little is known about the mindset behind them; new study finds that people who commit cyber-attacks against the government also tend to download music illegally and participate in physical protests; surprisingly, however, they do not appear to be acting out of some sense of national pride or patriotism

  • Bolstering e-mail security

    On the whole, security is not a primary concern for most day-to-day e-mails, but some e-mails do contain personal, proprietary, and sensitive information, documents, media, photos, videos, and sound files; the open nature of e-mail means that they can be intercepted and if not encrypted, easily read by malicious third parties

  • Apple rejects app which tracks drone strikes against militants

    Apple has rejected an app, developed by a New York student, which tracks U.S. drone strikes in Pakistan; Apple said the app violated rule 16.1 of its guidelines, which bans “excessively objectionable or crude content”

  • FBI denies hackers’ claim that they had stolen Apple ID data

    The FBI on Tuesday disputed the claim of a computer hacker group that said it had stolen the personal identification data on millions of Apple device owners from an FBI agent’s laptop

  • Cloud OS for the U.S. intelligence community

    Cloud management specialist Adaptive Computingis partnering with the investment arm of the CIA, In-Q-Tel, to develop a cloud operating system for use by U.S. intelligence agency

  • Law-enforcement agencies eager for Web-surveillance tools

    Private technology firms are pitching software capable of analyzing large swaths of the Internet to local law enforcement looking for ways to stop the next mass shooting or domestic terrorist event before it happens; police departments hope the software will help them detect online information from terrorists, traffickers, pedophiles, and rioters

  • ICE, federal agencies train computer forensic investigators

    For the past fourteen years, U.S. Immigration and Customs Enforcement (ICE) has been responsible for training ICE officers and special agents to become computer forensic investigators; ICE teaches the class in conjunction with the U.S. Secret Service and the Internal Revenue Service

  • NSF awards Norwich University a grant for computer security scholarships

    Norwich University in Vermont was awarded a $975,000 grant from the National Science Foundation’s (NSF) Scholarship for Service program; the funds will be used to support Information Assurance students; the students will fulfill the “service” obligation through employment by a government agency in their area of information assurance expertise for two years

  • U.S. always ends up regulating new technologies for public safety; the Internet is no exception

    Homeland Security News Wire’s executive editor Derek Major talked with CSIS’s James Lewis about the cybersecurity challenges the United States faces, Stuxnet, China’s hacking campaign, cyber arms control efforts, and more; on the stalled cybersecurity bill, opposed by critical infrastructure operators as being too burdensome, Lewis says: “It takes America about 20-40 years to come to terms with a new technology, but we always end up regulating it for public safety. This will be no different. We are in year 17.”

  • Most cybersecurity incidents in Europe remain undetected or not reported

    In a new report, the EU cyber security agency takes a snapshot of existing and future EU legislation on security measures and incident reporting; the analysis underlines important steps forward, but also identifies gaps in national implementation, as most incidents are not reported

  • Siemens software which controls power plants vulnerable to hackers

    RuggedCom is a Canadian subsidiary of Siemenswhich sells networking equipment for use in harsh environments with extreme and inclement weather; many critical infrastructure operators of power plants, water systems, dams, and more; a security specialist discovered a flaw in the software, a flaw which allows hackers to spy on communication of infrastructure operators and gain credentials to access computer systems which control power plants as well as other critical systems

  • U.S. may already have authority to issue infrastructure protection regulations

    While the president and Congress continue to debate the cybersecurity bill, the White House Office of Management and Budget may already have sufficient statutory authority to enact new regulations through the normal notice-and-comment rulemaking process; the basis for such regulations would be the Data Quality Act (DQA) which sets the standards for the integrity of data used by federal agencies in public disseminations

  • Obama considering executive order for infrastructure protection

    President Barack Obama is exploring whether to issue an executive order to protect the U.S. critical computer infrastructure from cyber attacks; White House sources say an executive order is being considered after a 2 August procedural vote in the Senate that all but doomed a scyberecurity bill endorsed by Obama as well as current and former national security officials from both Republican and Democratic administrations

  • Wynyard Group takes New Zealand Police forensics solution global

    Developed in 2007, New Zealand Police technology called EVE (Environment for Virtualized Evidence) allows enforcement officers rapidly to analyze seized electronic goods such as mobile phones, PCs, and other storage devices for evidence and intelligence

  • Improved disaster resilience is imperative for U.S: report

    A new report from the National Academies says that it is essential for the United States to bolster resilience to natural and human-caused disasters, and that this will require complementary federal policies and locally driven actions that center on a national vision – a culture of resilience; improving resilience should be seen as a long-term process, but it can be coordinated around measurable short-term goals that will allow communities better to prepare and plan for, withstand, recover from, and adapt to adverse events