Government

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Linux not ready for DOD prime time

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux does not meet the Defense Information Infrastructure's Common Operating Environment Kernel Platform Compliance requirements for a Posix-compliant application programming interface, Posix-compliant commands and utilities, the Motif X Window System interface, the Common Desktop Environment and Network File System sockets. . . .

Privacy key issue at tech policy summit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rep. Tom Davis, R-Va., thinks the government also needs a privacy czar who would coordinate information protection among federal agencies. Many of those agencies have chief information officers who are responsible for privacy issues - but that's in addition to a . . .

Study Shows: FBI Alienates Industry Security Experts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of . . .

Feds certify lab to test security apps

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.

Code is not free speech

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .

FCC Wiretap Order Overturned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Oscar S. Cisneros writes: "Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore . . .

Court rules for tougher surveillance standards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Federal Court of Appeals for the District of Columbia ruled yesterday that law enforcement agents seeking to intercept data packets that combine addressing information and the content of communications must meet the higher legal requirements needed for a search warrant. . . .

Online balloting thwarts hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An electronic balloting service stopped 35 attempts to hack into the Reform Party's presidential nomination process in another successful step toward online voting, eBallot.net Inc. officials said.

FBI, Mounties hunt Internet hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

RCMP are working with the FBI to track down computer hackers who overloaded an Edmonton-based Internet service provider yesterday, denying access to some customers. Edmonton RCMP found the "denial of service" attack on OA Group Inc.'s server that barred subscribers . . .

Feds shape cyberwarning strategy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Under pressure from Congress to better coordinate the government's response to computer viruses and other cyberattacks, the National Security Council has developed a plan outlining roles and responsibilities for federal cybersecurity organizations.

Wiretapping, You, and the Government.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Oscar S. Cisneros writes: "A new government-approved standard for telecommunications equipment violates the Fourth Amendment's prohibition against unreasonable searches and seizures, critics say. The standard, released in updated form last week by the Telecommunication Industry Association, instructs telecommunications hardware manufacturers on . . .

Infosec education needs revamping, professor warns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A report to be published this year by one of the nation's top educators in information systems and security warns that the current system of higher education cannot support the demand for information assurance professionals and calls for a revolutionary change . . .

Web stakeout

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As unlikely as it may sound, lawyers and computer security experts agree on one thing: When it comes to determining what's legal and what's not on the information superhighway, there are more questions than answers. And the shortage of clear-cut legal . . .

Another massive Net attack looming?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Do you think there should be network security standards set by the government? According to MSNBC "insurance companies and the security industry are considering quasi-government regulation to try to compel Internet firms to take basic security steps." This was . . .

Hackers won't give Pentagon a break

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

U.S. Defense Department pleas to computer hackers to quit mischief-making appear to be falling largely on deaf ears, making spotting potential national security threats more difficult, a top Pentagon expert says.. . .

Government Wants Internet Emergency Preparedness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Attempting to expand a system that allows disaster-relief agencies to place prioritized phone calls in times of emergency, a US government agency earlier this month asked engineers to build similar capabilities into the technology that runs the Internet. At an Aug. . . .

Hack Attacks On Pentagon Sites Persist

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite crying "uncle" and appealing to hackers to leave their locales alone, US Defense Department officials said that mischief-making cyber vandals continue to target Pentagon Web sites. The ongoing acts, or "events," as described in a Reuters report, include probes, scans, . . .