Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
National Security Correspondent J.J. Green has traveled three continents covering intelligence, terrorism, and security issues. From Afghanistan to Africa, Iraq to Ireland, there isn't anywhere J.J. won't go, nor anyone he won't talk with, to get the stories affecting the cyber security community.
Companies planning to bring aboard some new staff should rethink their secret use of social networking Web sites, like Facebook, to screen new recruits. William Stoughton of North Carolina State University, lead author of a study published in Springer's Journal of Business and Psychology, indicated in his work this practice is viewed by some as a breach of privacy and could create a negative impression of the company for potential employees. This type of spying could even lead to law suits.
Budget cuts notwithstanding, the U.S. Air Force plans to add 1,000 new personnel between 2014 and 2016 as part of its cyber security units. The 24th Air Force at Joint Base San Antonio-Lackland, Texas is home to the U.S. Air Force cyber command. With a budget of about $1 billion and a staff of roughly 400 military and civilian personnel, the command oversees about 6,000 cyber defense personnel throughout the Air Force.
You've heard of email and snail mail - but what about jail mail? It is something that will soon be on the way to some inmates at the Pasco County Jail in Florida. Sheriff Chris Nocco says 77 kiosks are being set up in the jail housing units. The set-ups will let inmates read and send email to those who have approved accounts. The sheriff says there will be no cost to taxpayers for the service. While inmates will be able to get email and photos, they will only be able to send email, not photos. And - as is the case with regular mail, deputies will be monitoring inmates email.
A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat. Theodore H. Moran, a professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.
National Security Advisor Susan Rice has sent a strong message to the Chinese. During a speech at Georgetown University, she said, "Cyber-enabled economic espionage hurts China as well as the U.S., because American businesses are increasingly concerned about the costs of doing business in China." U.S. Intelligence officials have been sounding alarms about China's high tempo of economic espionage for more than a decade.
You've heard of Stuxnet --the destructive computer virus unleashed on Iran's nuclear facilities. It was believed to be the world's first cyber weapon. But now we're learning that it has a twin --and the twin actually came first and started eating away at Iran's nuclear facility at Natanz years before the more public version we learned about in 2010. The bad news for Iran's nuclear programmers is that it's not really clear how broad the Stuxnet family is.
CYPTOLOCKER is a type of Ransomware that restricts access to infected computers and requires victims to pay a ransom in order to rescue their computers from criminals who take them over. It's so sophisticated that one US police force was hit by the virus and forced to pay a ransom using a new virtual currency called bit coins. Pfishing emails --which look legitimate, with subject lines like "payroll or package delivery" are the usual method of delivery.
Every day it seems there's a new Cyber Security threat. Everything from ransom ware to zero day issues. Cyber security insurance has been the way that companies have tried to offset the risk of online attacks and data loss, but the insurers were missing the information they needed to convince potential clients to buy their products. But now threat intelligence is helping them gauge the risk that potential customers might encounter.
A self-described "hacktivist" will spend 10 years in prison for illegally accessing computer systems of law enforcement agencies and government contractors. Before hearing his sentence, an unrepentant Jeremy Hammond told a federal judge that his goal was to expose injustices by the private intelligence industry when he joined forces with Anonymous. "Yes I broke the law, but I believe sometimes laws must be broken in order to make room for change," he said. The Chicago computer whiz and college dropout insisted his hacking days are over but added, "I still believe in hacktivism as a form of civil disobedience."
Google is warning U.S. lawmakers that U.S. spying operations risk fracturing the open Internet into a "splinter net" that could hurt American business. In the first public testimony before Congress by a major technology company since former National Security Agency contractor Edward Snowden disclosed top secret surveillance programs, Google said it should be allowed to provide the public more information about government demands for user data.
Adobe Systems Inc. says that the scope of a cyber-security breach disclosed nearly a month ago was much worse than initially reported. They now say attackers obtained data on more than 38 million customer accounts. The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
Singapore's government is on heightened alert for cyber-attacks after threats from claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action. "Government agencies have been on heightened vigilance and have enhanced the security of their IT systems in response to the declared threats against the government's ICT infrastructure," the Infocommunications Development Authority of Singapore (IDA) said in a statement.
Israel's military chief Lt. Gen. Benny Gantz says computer sabotage is a major concern and he warned a sophisticated cyber-attack could one day bring the nation to a standstill. In fact, a month before his address, a major artery in Israel's national road network in the northern city of Haifa was shut down because of a cyber-attack by a Trojan horse. Key operations were knocked out of commission for two days causing hundreds of thousands of dollars in damage.
A British man has been arrested in England and charged by the United States and Britain with infiltrating U.S. government computer systems, including those run by the military, to steal confidential data and disrupt operations, the Associated Press reports. U.S. prosecutors said the alleged hacker, Lauri Love, infiltrated thousands of computer systems including those of the Pentagon's Missile Defense Agency, the U.S. Army Corps of Engineers, the U.S. space agency NASA and the U.S. Environmental Protection Agency.
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cyber criminals to infect PCs, according to a person familiar with the situation. A former Russian police detective in contact with Russia's federal government told Reuters that the suspect, who is known in hacking circles as "Paunch," had been arrested.
The U.S. National Security Agency swept up 70.3 million French telephone records in a 30-day period, according to a newspaper report Monday that offered new details of the massive scope of a surveillance operation that has angered some of the country's closest allies. The French government summoned the U.S. ambassador for an explanation on Monday and renewed demands for talks on protection of personal data, as well as pledges that the surveillance would cease.
Homeland Security News is reporting that if hackers can steal a company's top-secret data, they can just as easily destroy a company's network. Richard Bejtlich, chief security officer for Mandiant, a cyber-security company, said not only are hackers getting into networks to steal huge amounts of intellectual property but they can also permanently erase data.
Cyber security advocates are frustrated that new legislation is caught between a rock and a hard place. It's stuck in contentious debates over government surveillance and the government shutdown. NSA's highly skilled cyber workers have been told to stay home, weakening the nation's ability to protect critical cyber infrastructure. Thousands of people with PHDs and math whizzes and thousands of computer scientists have been sitting idly at home.
Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.
Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.