menu

Topic:

PR, Social Media and Govt 2.0

Hard Skills In Cyber Are Even More Rare Than We Thought

At the most recent in the excellent Federal Computer Week/Juniper Networks series of cyber discussion breakfasts, Alan Paller gave us a wake up call. He said the biggest problem was that we have tilted the entire tech world to the point where the “talkers” appeared to be of more value than the “doers.” The talkers get paid more than the technicians. Paller likened it to a system that would pay doctors less than you do the guy who is the hospital manager.

Black Cyber Ops on Rise

Black Cyber Ops on Rise – DoD Buzz
Black-Cyber-Operations have become all too common, launching highly sophisticated cyber actions against their targets that go undetected for months or years. A black operation is generally accepted worldwide by militaries and intelligence agencies to represent specific types of covert operations typically involving activities that are either secret or of questionable legitimacy and often violate international law and demand deniability.

6 Ways Law Enforcement Uses Social Media to Fight Crime

6 Ways Law Enforcement Uses Social Media to Fight Crime From felons on Facebook to tips through Twitter, social media is being used more and more by law enforcement agencies, and not just to fight Internet-related crimes. We’re talking about solving crimes that are happening on the street and in your community.

Former TSA worker indicted on tampering charges

Former TSA worker indicted on tampering charges – NextGov
A former Transportation Security Administration analyst was indicted on Wednesday for tampering with databases used to track possible terrorists entering the United States, according to an IDG News Service report.

Feds consider going undercover on social networks

Feds consider going undercover on social networks | Politics and Law – CNET News The next friend request you receive might come from the FBI. The Obama administration has considered sending federal police undercover on social-networking sites, including Facebook, MySpace, and Twitter

Terrorists Use the Internet But Not How You Might Think

I have to admit that in the past I have been guilty of a sin of omission that has plagued many commentators in the cyber arena. I have spoken and written many times about the terrorist threats I see as strong and dangerous possibilities. I have always mentioned the present terrorist use of the internet as an aside, and so much a lesser issue as to be unworthy of too much worry. I will stand up and admit that I have been WRONG. Yes, the terrorists have not used the cyber world for an attack as we might envision, but the threat presented by what they do now is real and chilling.

LTG Russel Honore’s Candor on Communications

In what was one of his typically colorful appearances, ret. US Army LTG Russel Honore, the famed “Ragin Cajun” of Hurricane Katrina fame did not disappoint the assembled audience of the 4th Annual DHS University Network Summit. Before a packed hotel ballroom of PhDs, graduate students, DHS S&T leaders, industry reps and more, Honore dropped one-liners and candid, colorful observations that literally had the audience roaring in laughter. Amidst the laughter though were some very frank observations about our nation’s preparedness and overall resilience posture.

Cyber Threat Vectors: Are we looking at them all?

We often talk about cyber threats in different ways. Some speak of them based on who the bad guys are: hackers, terrorists, cyber criminals or nation states. Others use the bad guys’ technical approach as a means to define them: SQL injection, Memory Scrappers, DDoS Attacks, etc. A third way, one based on distance from targets, was used by Steven Chabinsky of the FBI recently in several venues. I think it adds to the depth of our analysis, and bring to the fore some key areas that are often overlooked.

California Issues Telework Policy to Curb Cyber-Security Risks

California Issues Telework Policy to Curb Cyber-Security Risks – Government Technology
To bolster security and create consistency in California’s IT infrastructure, the Office of the State Chief Information Officer (OCIO) issued a new policy Tuesday, March 2, that includes telework and remote access security standards as well as a compliance form that state agencies must submit by July 1.

Will the Pentagon Finally Get Web 2.0?

Will the Pentagon Finally Get Web 2.0? – Wired
On Friday, the Pentagon announced a new social media policy that will the troops to use Twitter, Facebook and other social networking sites, within limits. True to form, Pentagon social media czar Price Floyd announced the policy change in a Twitter update.