Apr
19
2009
Comments Off on Woodstock pond searched for Tori Stafford – Toronto Star | tags: cap, google, news, security, tv | posted in technical news
Apr
19
2009
suraj.sun writes with this quote from the Associated Press:”Britain’s domestic spy agency — MI5 — is hunting for its very own ‘Q,’ of sorts. MI6’s sister organization, which carries out surveillance on terror suspects inside Britain and gives security advice to the government, is searching for someone to lead its scientific work. Projects could include everything from developing counterterrorism technology to tackling a biological or chemical attack. ‘Looking for a chief scientific adviser to lead and coordinate the scientific work of the security service so that the service continues to be supported by excellent science and technology advice,’ MI5’s Web site ad reads. MI5 has long had a roster of scientific staff tasked with developing high-tech gadgets, but an official said the service now wants a high-profile figure to lead pioneering work in technology and science. The adviser’s work will focus chiefly on creating sophisticated new tools to help security service officers carry out surveillance and analysis work, said a government security official, who requested anonymity to discuss the work of MI5.”
Read more of this story at Slashdot.
Comments Off on British Spy Agency Searches For Real-Life ‘Q’ | tags: google, security, technology, web | posted in technical news
Apr
19
2009
Comments Off on Woodstock pond searched for Tori Stafford – Toronto Star | tags: cap, google, news, security | posted in technical news
Apr
19
2009
Comments Off on Woodstock pond searched for Tori Stafford – Toronto Star | tags: cap, google, news, security, tv | posted in technical news
Apr
18
2009
Jamyang (Greg Walton) writes “I am editor of the Infowar Monitor and co-author of the recent report, Tracking Ghostnet. I have been asked by the Office of His Holiness, the Dalai Lama (OHHDL) and the Tibetan Government in Exile (TGIE) to offer some policy recommendations in light of the ongoing targeted malware attacks directed at the Tibetan community worldwide. Some of the recommendations are relatively straightforward. For example, I will suggest that OHHDL convene an international Board of Advisers, bringing together some of the brightest minds in computer and international security to advise the Tibetans, and that the new Tibetan university stands up a Certified Ethical Hacking course. However, one of the more controversial moves being actively debated by Tibetans on the Dharamsala IT Group [DITG] list, is a mass migration of the exile community (including the government) to Linux, particularly since all of the samples of targeted malware collected exploit vulnerabilities in Windows. I would be very interested to hear Slashdot readers opinions on this debate here.” (More below.)
Read more of this story at Slashdot.
Comments Off on A Secure OS For the Dalai Lama? | tags: google, linux, malware, security | posted in technical news
Apr
18
2009
Death Metal sends this excerpt from an AP report: “General Dynamics Information Technology put out an ad last month on behalf of the Homeland Security Department seeking someone who could ‘think like the bad guy.’ Applicants, it said, must understand hackers’ tools and tactics and be able to analyze Internet traffic and identify vulnerabilities in the federal systems. In the Pentagon’s budget request submitted last week, Defense Secretary Robert Gates said the Pentagon will increase the number of cyberexperts it can train each year from 80 to 250 by 2011. With warnings that the US is ill-prepared for a cyberattack, the White House conducted a 60-day study of how the government can better manage and use technology (PDF) to protect everything from the electrical grid and stock markets to tax data, airline flight systems, and nuclear launch codes. … Nadia Short, vice president at General Dynamics Advanced Information Systems, said the job posting for ethical hackers fills a critical need for the government.”
Read more of this story at Slashdot.
Comments Off on DHS Seeks "Ethical Hackers" To Protect Federal Net Infrastructure | tags: google, security, technology | posted in technical news
Apr
17
2009
GhostX9 writes “Tom’s Hardware’s continuing series on computing security has an interview with Adam Barth and Collin Jackson, members of Stanford University’s Web Security Group and members of the team that developed Chromium, the open-source core behind Google Chrome. The interview goes into detail regarding the sandboxing approach unique to Chromium, comparisons between the browser and its competition, and web security in general.”
Read more of this story at Slashdot.
Comments Off on A Closer Look At Chromium and Browser Security | tags: google, open source, security, web | posted in technical news
Apr
17
2009
Hugh Pickens writes “The NY Times reports that legal and operational problems surrounding the NSA’s surveillance activities have come under scrutiny from the Obama administration, Congressional intelligence committees, and a secret national security court, and that the NSA had been engaged in ‘overcollection’ of domestic communications of Americans. The practice has been described as significant and systemic, although one official said it was believed to have been unintentional. The Justice Department has acknowledged that there had been problems with the NSA surveillance operation, but said they had been resolved. The Office of the Director of National Intelligence, which oversees the intelligence community, did not address specific aspects of the surveillance problems, but said in a statement that ‘when inadvertent mistakes are made, we take it very seriously and work immediately to correct them.’ The intelligence officials said the problems had grown out of changes enacted by Congress last July to the law that regulates the government’s wiretapping powers, as well as the challenges posed by enacting a new framework for collecting intelligence on terrorism and spying suspects. Joe Klein at Time Magazine says the bad news is that ‘the NSA apparently has been overstepping the law,’ but the good news is that ‘one of the safeguards in the [FISA Reform] law is a review procedure that seems to have the ability to catch the NSA when it’s overstepping — and that the illegal activities have been exposed, and quickly.'”
Read more of this story at Slashdot.
Comments Off on NSA Overstepped the Law On Wiretaps | tags: google, Intel, news, obama, security | posted in technical news
Apr
17
2009
National Defense University researchers are encouraging the U.S. Defense Department to develop a strategy to use social media to strengthen national security.
Comments Off on Social-media tools could support national security | tags: security | posted in technical news
Apr
17
2009
Comments Off on Thailand's Sondhi successfully operated upon – doctor – Reuters | tags: 3G, google, news, security | posted in technical news