Category: computer security

Preparing for the “Wake Up Call”

Despite the emphasis placed on IT security in recent years, federal agencies are not testing their security controls with any consistency or timeliness, and as a result may not realize their systems’ weaknesses, a new General Accounting Office report has…

Danger in Stretching the Metaphor

In the midst of pre-election excitement this gem went largely unnoticed outside of the parallel geek world I also inhabit: During a media conference here Nov. 2, Secretary of the Air Force Michael W. Wynne said the 8th Air Force…

FBI HR Seeing the Light?

The FBI places cyber attacks among its top three priorities, said Mark Mershon, assistant director in charge of the New York City field office. In fact, prevention is so important the crime-fighting agency will negotiate its normally strict employment standards…

What you get when you recycle

Another apparent breach of classified material is under federal investigation at the nation’s premier nuclear weapons laboratory: Los Alamos National Laboratory, sources tell CBS News correspondent Sharyl Attkisson. The breach apparently was discovered when Los Alamos police recently conducted a…

FID: Fear, Incompetence & Doubt

Dr. Stephen Haag spends upwards of 80 hours each week on his computer, mapping out terrorist attacks. Haag, an expert in emerging technologies, believes the next attack on the U.S. will come not in the form of bombings or military…

Defeating Internet Terrorists

The Internet has become the “seductive hypermedia” for radical Islamic terrorists, with official and unofficial Web sites, forums and chatrooms that appeal to supporters worldwide. Most Web sites are intended to advance a group’s propaganda to increase their supporting audience,…