Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

DOD OIG Audit – Sanitization and Disposal of Excess Information Technology Equipment

Sanitization and Disposal of Excess Information Technology Equipment (Report No. D-2009-104) “We determined whether DOD Components sanitized and disposed of excess unclassified information technology (IT) equipment in accordance with Federal and DOD requirements. We also determined whether the Defense Reutilization and Marketing Service (DRMS) disposed of excess IT equipment in accordance with security requirements; and… Continue Reading

DHS and Information Technology Sector Coordinating Council Release Information Technology Sector Baseline Risk Assessment

News release: “The Department of Homeland Security (DHS) and the Information Technology Sector Coordinating Council (IT SCC) today released the IT Sector Baseline Risk Assessment (ITSRA) to identify and prioritize national-level risks to critical sector-wide IT functions while outlining strategies to mitigate those risks and enhance national and economic security…The ITSRA validates the resiliency of… Continue Reading

PBS Frontline: Ghana – Digital Dumping Ground

PBS.org FRONTLINE – Ghana, Digital Dumping Ground: “When containers of old computers first began arriving in West Africa a few years ago, Ghanaians welcomed what they thought were donations to help bridge the digital divide. But soon exporters learned to exploit the loopholes by labeling junk computers “donations”…[What is on the hard drives from this… Continue Reading

Cyber-Ark 2009 Trust, Security & Passwords Survey Research Brief

2009 Trust, Security & Passwords Survey Research Brief: “This global “snooping” survey is the third in a series of benchmark studies focused on identifying security and privacy trends among IT workers. Results are intended to raise awareness about the risks associated with powerful, and often unmanaged, privileged users and passwords. While seemingly innocuous, these accounts… Continue Reading

DHS OIG: Progress in Addressing Security Challenges at Washington Dulles International Airport

OIG-09-66 – DHS’ Progress in Addressing Technical Security Challenges at Washington Dulles International Airport (Redacted), May 2009 “…more work is needed to address physical and environmental control deficiencies. CBP also needs to implement technical controls to ensure that it is using the most current version of operating systems. Further, CBP [U.S. Customs and Border Protection]… Continue Reading

Report: Enhancing Child Safety & Online Technologies

Berkman Center for Internet & Society at Harvard University report: Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Technical Taskforce to the Multi-State Working Group on Social Networking of State Attorneys General of the United States in December of 2008. “Many youth in the United States have fully integrated the Internet… Continue Reading

FTC Shuts Down Notorious Rogue Internet Service Provider

News release: “A rogue Internet Service Provider that recruits, knowingly hosts, and actively participates in the distribution of spam, child pornography, and other harmful electronic content has been shut down by a district court judge at the request of the Federal Trade Commission. The ISP’s upstream providers and data centers have disconnected its servers from… Continue Reading

Cyberspace Policy Review – Assuring a Trusted and Resilient Information and Communications Infrastructure

White House: Securing Our Digital Future, Melissa Hathaway, Cybersecurity Chief at the National Security Council, discusses securing our nation’s digital future. Cyberspace Policy Review – Assuring a Trusted and Resilient Information and Communications Infrastructure, May 29, 2009: “The President directed a 60-day, comprehensive, “clean-slate” review to assess U.S. policies and structures for cybersecurity. Cybersecurity policy… Continue Reading

DOT OIG: Review of Web Applications Security and Intrusion Detection in Air Traffic Control Systems

Review of Web Applications Security and Intrusion Detection in Air Traffic Control Systems, May 04, 2009 “On May 4, 2009, we issued our report on Federal Aviation Administration (FAA) web applications security and intrusion detection in air traffic control (ATC) systems, requested by the Ranking Minority Members of the full House Transportation and Infrastructure Committee… Continue Reading

FTC Testifies on Data Security, Peer-to-Peer File Sharing

News release: “The Federal Trade Commission today testified on the Commission’s efforts to promote better security for sensitive consumer information and to prevent the inadvertent sharing of consumers’ personal or sensitive data over Peer-to-Peer Internet file-sharing networks. As part of these efforts, the agency also announced that it had reached an agreement with one of… Continue Reading

WSJ: Electricity Grid in U.S. Penetrated by Spies

“Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials…But protecting the electrical grid and other infrastructure is a key part of the Obama administration’s cybersecurity review, which is to be completed next week. Under the Bush administration,… Continue Reading