-
Experts express concern about REAL-ID security
National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes
-
-
Debate over 700 MHz intensifies
Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle
-
-
L-1 buys Maryland's Advanced Concepts
Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access
-
-
$100 laptop for developing world poses IT security concerns
Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”
-
-
DHS plans back-up cross-agency data center
Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer
-
-
Gonzales ignores critics, focuses on identity theft
Attorney General proposes a national information sharing system; presidential task force suggests national standards
-
-
Radio used to hack computer screens
An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique
-
-
Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP
VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed
-
-
GD wins $6 biillion IWN contract
GD leads a team of IT heavyweights to build a nationwide interoperable wireless network linking the Justice, Homeland Security, and Treasury departments
-
-
Los Alamos cybersecurity focus of congressional hearing
The names of 550 Los Alamos employees were posted on the Web site of a former subcontractor; the information was gathered for a badge reader which was never used
-
-
HP adds security to network management package
HP adds two security applications to popular network management suite — and emphasizes adding security on the edge
-
-
Canada emergency response system requires CPR
So says a review of the recent Cyber Storm exercise; poor communications and data access cited as major concerns
-
-
ITSCC, ITGCC to coordinate their activities more closely
A group represneting companies active in the IT sector and an assoication of government departments and agencies relying on the services ofthese comoanies, will coordinate their activities more closely
-
-
Army considers creating a cyber command
Move would follow a recent Air Force decision to do the same; Army pays a visit to Barksdale Air Force Base to explore options
-
-
DoE inspector general raps agency's computer management system
Twenty desktop computers containing classified information are missing; another seventy-four lacked proper labeling
-
More headlines
The long view
Social Media’: The Changing Tech of Terror
By Adil Rasheed
In the wake of the white noise generated by mainstream social media channels and apps, a new trend of ‘anti-social media’ has emerged in recent years, which seeks to abandon mainstream platforms, reduce screen time, and seek private, intimate, or even ‘analogue’ communication to avoid algorithm-driven polarization, surveillance and loneliness. But some of these so-called anti-social media platforms have also become off-the-wall mediums for disseminating extremist propaganda.
Allfare: China’s Whole-of-Nation Strategy
By Michael Margolius
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
France Strikes to Address Misinformation Weakening Western Alliance
By Eric Frecon and Fitriani
The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.
