Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews on our daily show blogs.
Fake profile fooled military intelligence
Monday - 7/19/2010, 8:30am EDT
- She's pretty and flirty and a cyberpro. And Robin Sage is totally fake. The Washington Times reports that the Facebook profile for Robin Sage describes her as a 25-year old woman working as a "cyber threat analyst" at the U.S. Navy's Network Warfare Command. Within less than a month, she had nearly 300 social-network connections among security specialists, military personnel and staff at intelligence agencies and defense contractors. Her LinkedIn connections included men working for the chairman of the Joint Chiefs of Staff, the National Reconnaissance Office, a senior intelligence official in the Marine Corps, the chief of staff for a congressman, and several senior executives at defense contractors. She, however, was a big fake -- made up by security consultant Thomas Ryan as part of an effort to expose weaknesses in the defense and intelligence communities. Ryan says he even included red flags in her profile - including discrepancies about her age and experience. Oh. And there's no such thing as a "cyber threat analyst" at the Naval Network Warfare Command. Also, her name is taken from the code name of an annual special-forces military exercise.
- Think no one else is reading your work email? Think again. A new survey by Cyber-Ark Software found more than 40 percent of IT administrators have indulged in a little snooping around inside their own network, using administrative passwords to view sensitive or confidential information. Adam Bosnian is the executive vice president for the Americas and corporate development at Cyber-Ark Software. He told Chris Dorobek on the Dorobek Insider that many snoop simply because they have the access.
- The Senate could vote on major changes to the cybersecurity landscape in September. Senate aides tell Congress Daily that Majority Leader Harry Reid is pressing colleagues to combine two competing cybersecurity bills by then. An aide for Reid says that he's convinced swift action is necessary. Reid has met privately with the leaders of key Senate panels to press them on the issue.
Check out all of Federal News Radio's coverage of cybersecurity issues here.