Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews on our daily show blogs.
Fake profile fooled military intelligence
Monday - 7/19/2010, 8:30am EDT
- She's pretty and flirty and a cyberpro. And Robin Sage is totally fake. The Washington Times reports that the Facebook profile for Robin Sage describes her as a 25-year old woman working as a "cyber threat analyst" at the U.S. Navy's Network Warfare Command. Within less than a month, she had nearly 300 social-network connections among security specialists, military personnel and staff at intelligence agencies and defense contractors. Her LinkedIn connections included men working for the chairman of the Joint Chiefs of Staff, the National Reconnaissance Office, a senior intelligence official in the Marine Corps, the chief of staff for a congressman, and several senior executives at defense contractors. She, however, was a big fake -- made up by security consultant Thomas Ryan as part of an effort to expose weaknesses in the defense and intelligence communities. Ryan says he even included red flags in her profile - including discrepancies about her age and experience. Oh. And there's no such thing as a "cyber threat analyst" at the Naval Network Warfare Command. Also, her name is taken from the code name of an annual special-forces military exercise.
- Think no one else is reading your work email? Think again. A new survey by Cyber-Ark Software found more than 40 percent of IT administrators have indulged in a little snooping around inside their own network, using administrative passwords to view sensitive or confidential information. Adam Bosnian is the executive vice president for the Americas and corporate development at Cyber-Ark Software. He told Chris Dorobek on the Dorobek Insider that many snoop simply because they have the access.
- The Senate could vote on major changes to the cybersecurity landscape in September. Senate aides tell Congress Daily that Majority Leader Harry Reid is pressing colleagues to combine two competing cybersecurity bills by then. An aide for Reid says that he's convinced swift action is necessary. Reid has met privately with the leaders of key Senate panels to press them on the issue.
Check out all of Federal News Radio's coverage of cybersecurity issues here.