Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

Recycling of E-Waste Continues to Lag

Follow-up to previous postings on e-waste, see this New York Times article, Clearing a path from desktop to the recycler, by Paul Vitello. “The Environmental Protection Agency estimates that people threw away 2.5 million tons of electronic equipment, known as e-waste, last year, about 10 percent of which was recycled.” Continue Reading

New DHS OIG Reports on Classified Laptop Computer Security

Improved Administration Can Enhance U.S. Customs and Border Protection Classified Laptop Computer Security, Unclassified Summary, OIG-06-64 (PDF, 3 pages) November 1, 2006. Improved Administration Can Enchance Science and Technology Classified Laptop Computer Security, OIG-06-63, Unclassified Summary, (PDF, 3 pages) November 1, 2006. Continue Reading

Symantec Releases New Internet Security Threat Report

“The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a six-month period. It covers Internet attacks, vulnerabilities, malicious code, phishing, spam, security risks, and future trends. The tenth version of the report, released September 25, is now available.” Symantec Internet Security Threat Report Volume X: September 2006 (120 pages, PDF) Continue Reading

Committee Report Finds Data Breaches Throughout Federal Government

Press release: “In a report released today, Reps. Davis and Waxman summarize information provided to the Committee by 19 federal departments and agencies regarding the loss or compromise of personal information since January 2003. The report finds that every agency has experienced at least one such breach and that the agencies do not always know… Continue Reading

CMO Council Survey on ID Theft Tracks Growing Consumer Concern

Press release, October 4, 2006: “As information security concerns among consumers and other customer constituencies rise, just 29 percent of marketers say that their firm has a crisis containment plan in case of a security breach, according to findings of a major research initiative by the Chief Marketing Officer (CMO) Council. Without such a plan… Continue Reading

DOD OIG Audit of Information Assurance Weaknesses

Department of Defense Office of the Inspector General — Audit Summary of Information Assurance Weaknesses Found in Audit Reports Issued from August 1, 2005, through July 31, 2006 – Report No. D-2006-110 (PDF) – Date: September 14, 2006. “This report summarizes information assurance weaknesses that the Government Accountability Office, the DoD Office of the Inspector… Continue Reading

Operation Cyber Storm Report Released by DHS

Press release: “The U.S. Department of Homeland Security (DHS) announced today the release of the Cyber Storm Public Exercise Report. The report details key findings from Cyber Storm which was the largest and most complex multi-national, government-led cyber exercise to examine response, coordination, and recovery mechanisms to a simulated cyber event within international, federal, state,… Continue Reading

China Downloading DoD Data According to Warfighting Info Tech Director

Government Computer News: “China has downloaded 10 to 20 terabytes of data from the NIPRNet (DOD’s Non-Classified IP Router Network),” said Maj. Gen. William Lord, director of information, services and integration in the Air Force’s Office of Warfighting Integration and Chief Information Officer, during the recent Air Force IT Conference in Montgomery, Ala.” See also:… Continue Reading