Sharing of cyber threat information by the Homeland Security Department with the private sector presents some modest privacy risks, says the departmental privacy office.
GAITHERSBURG, Md. – As the privacy field seeks greater precision in a bid to make technical implementation of privacy controls a possibility, it should be cautious about the metrics it adopts, warns a computer scientist.
GAITHERSBURG, Md. – Privacy as a field lacks the precision of cybersecurity, leaving a gap when it comes to implementing specific protective measures, federal officials said today during a workshop at the National Institute of Standards and Technology.
New U.S. openness regarding its military cyber doctrine is so far unreciprocated by China, say U.S. officials. While on a 10 day trip to the Asia Pacific region, Defense Secretary Chuck Hagel said Pentagon officials "for the first time ever" have provided a briefing to Chinese officials on American military doctrine governing the use of cyber capabilities.
Private sector cloud computing providers will have a changed set of security controls to adhere to when selling to federal agencies starting later this summer.
A bill authorizing Coast Guard discretionary spending for two years at $8.7 billion annually sailed through the House of Representatives – to the chagrin of some on the House Homeland Security Committee.
Defense Secretary Chuck Hagel sought Friday to downplay the United States' recently-earned reputation for aggressiveness in cyberspace, even as he acknowledged a rapid pace of personnel expansion within Cyber Command. The Defense Department, he said, "will maintain an approach of restraint to any cyber operations outside the U.S. government networks. We are urging other nations to do the same."
Expert witnesses and litigation consultants hired by U.S. attorney's offices received waivers lasting more than three years that exempted them from encryption rules meant to protect Justice Department information.
Anyone lamenting today's lack of a cyber war grand strategist – someone "with great vision who will declare to the world what great power lies therein" – overlooks the properties of cyberspace, writes a Rand scientist in a paper.
Under a proposal offered to the federal judiciary's Advisory Committee on Rules of Criminal Procedure, law enforcement would be allowed to remotely access computers they suspect were used in crimes – even if the computers are located in a different judicial district than the one granting the warrant.