Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: J.J. Green
U.S. and allied intelligence agencies say chemical weapons were likely used by Syrian forces in an attack near Damascus. Reuters reports they think it happened "with high-level approval from the government of President Bashar al-Assad, according to American and European security sources." Reuters also says, "the early intelligence finding could increase pressure for action by President Barack Obama, who has made clear that he plans to tread cautiously even as his aides air their differences in a debate over possible military responses to the Syrian government."
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private researchers express disillusionment with the National Security Agency. Experts say much of the goodwill that existed has been erased after the NSA's classified programs to monitor phone records and Internet activity were exposed by former NSA contractor Edward Snowden.
Your web browser. No matter which one you use, it's vulnerable. The U.S. Computer Emergency Readiness Team (USCERT) says it is vital to configure them securely. USCERT says often the operating system is not set up in a secure default configuration. Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer.
Al Qaida latest terror plot has a huge impact without them even launching an attack. That according to intelligence and law enforcement officials all over the world is one of the big pay-offs for Al Qaida and other terrorist groups involved in the recent Embassy plots overseas. Authorities say the main goal of these groups is to frighten people, force governments to spend money and resources to react to the plots, and to achieve publicity for themselves.
The Pacific Ocean is big enough for both the U.S. China. That's what the Chinese Secretary of Defense says. But posturing between the U.S. and China seems to suggest something different. During a joint news conference at the Pentagon Gen. Chang Wanquan agreed with US Secretary of Defense Chuck Hagel t that there is room for greater U.S.-China military cooperation, including joint exercises and high-level visits.
US drones in Iraq. They've been there before. But could they be there again? Iraq's top diplomat wants them there to help fight Al Qaida. Iraqi's foreign minister is Hoshyar Zebari says Iraqi forces need U.S. help with surveillance and analyzing intelligence. He suggests that an unspecified but limited number of American counterterror advisers could be stationed in Iraq to help its military deter a recent spike in deadly attacks.
Not only are Americans suspicious of NSA, but according to bizjournal.com Washington bureau, Foreign competitors are looking to aggressively grow their market share in cloud computing because of concerns raised by the National Security Agency's PRISM program. Bizjournals.com reports U.S. cloud computing companies could lose $22 billion to $35 billion in revenue over the next three years because of foreign customers' concerns about the privacy of their data.
The chief scientist with Berlin's Security Research Labs, revealed recently that he led a research team at the German firm that figured out a way to remotely gain control of and also clone some mobile SIM cards. Karsten Nohl, a well-known security expert said mobile carriers have quickly protected customers from that security bug that he revealed 10 days ago and that he estimated had put more than 500 million phones at risk of cyber-attacks.
A top U.S. military official says Afghanistan, even after foreign troops have left will remain dependent on international troops for security many years to come. U.S. General Joseph Dunford, the U.S. commander of the NATO-led force told Reuters, he argued for a significant presence after the U.S.-dominated International Security Assistance Force (ISAF) is disbanded next year. Reuters reports, "the White House favors about 7,000 U.S. troops, but some in the U.S. military would prefer two or three times as many."
When US forces leave Afghanistan next year, the absence of the counter-balance will be noticed. Pakistan-based militants say they will attack India once Western troops leave Afghanistan in 2014. That will likely increase tensions between India and Pakistan, both of which have nuclear weapons. The threats were made by Lashkar-e-Taiba (LeT), blamed for the 2008 commando-style raid on Mumbai that killed 166 people.