menu

Topic:

Critical Infrastructure

Pentagon seeks $3.2 billion for revised cyber budget

Pentagon seeks $3.2 billion for revised cyber budget – NextGov
Protecting military networks in fiscal 2012 would cost nearly $1 billion more than the Pentagon publicly reported last month, an increase that reflects the growing number of programs being re-categorized as cybersecurity-related, agency officials said.

DHS, Agencies Take Precautions In Wake of RSA Breach

DHS, Agencies Take Precautions In Wake of RSA Breach – NextGov
The Homeland Security Department is coordinating with agencies to ensure federal networks are not compromised by a cyber attack Thursday that hit computer security contractor RSA, DHS officials said Friday.

An Achilles' Heel

An Achilles’ Heel – National Journal
It’s long been the stuff of nightmares for America’s top homeland-security officials. Well-trained terrorists assault one of the nation’s nuclear-power plants, nearly a dozen of which are near major metropolitan areas. The militants kill the facility’s private-security guards and make their way to the plant’s reactor. Federal law-enforcement personnel rush to the scene, but it’s too late.

Terrorists' Use Of Internet, Problems Combating It Detailed In Congressional Report

Terrorists’ Use Of Internet, Problems Combating It Detailed In Congressional Report – HSToday
A Congressional Research Service (CRS) report released last week, Terrorist Use of the Internet: Information Operations in Cyberspace, “describes the ways that international terrorists and insurgents use the Internet strategically and tactically in pursuit of their political agendas.”

Former NSA, CIA Chief: Declassify Cyber Vulnerabilities

Former NSA, CIA Chief: Declassify Cyber Vulnerabilities – Wired Threat Level
The former head of America’s most powerful and secretive intelligence agencies thinks the U.S. government classifies too much information on cybersecurity vulnerabilities.

The Pain of Japan – The Lessons to be Learned from NLE11

The images coming out of quake-damaged Japan are truly indescribable. Incidents like the 8.9 earthquake and its follow-on tsunami give us all a reason to pause from our daily lives to wonder what would we do if something like that happened here. That’s just the question the people behind the National Level Exercise 2011 have been asking themselves for nearly a year, as they have been working to pull all of the pieces together for the full-scale drill on the nation’s preparedness that will take place this coming May.

Has U.S. Already Begun Censoring the Internet?

Has U.S. Already Begun Censoring the Internet? – Yahoo News Commentary
With Middle East countries in turmoil the subject of Internet censorship has been a major focal point of the civil unrest. The civil protests and unrest in the Middle East were dubbed the “Twitter Revolution” or the “Facebook Revolution” by many reporters and media outlets.

Rules keep hackers from helping government, ex DHS head says

Rules keep hackers from helping government, ex DHS head says – NextGov
Friendly hackers and other computer whizzes who could help bolster government’s cyber defenses often are unable to collaborate with the Homeland Security Department because of outdated policies that Congress and the White House must reform, former DHS Secretary Tom Ridge said on Tuesday.

Financial terrorism suspected in 2008 economic crash

Financial terrorism suspected in 2008 economic crash – Washington Times
Evidence outlined in a Pentagon contractor report suggests that financial subversion carried out by unknown parties, such as terrorists or hostile nations, contributed to the 2008 economic crash by covertly using vulnerabilities in the U.S. financial system.

Contradictions in U.S. cybersecurity policy

Contradictions in U.S. cybersecurity policy – Homeland Security Newswire
The United States wants a secure cyberspace, but its intelligence agencies have found enormous utility in using their own computer hacking capabilities to collect confidential information from foreign adversaries; this raises the question of how the U.S. government can push for global cybersecurity while at the same time using cyber means to collect intelligence on potentially threatening regimes such as Iran.