The rising use of new communication technology is changing the balance of control and ownership of information among states and individuals, leading to increased monitoring of government diplomacy by individuals and other nations.
The State Department has been vulnerable to another breach of diplomatic cables in the 2 years since WikiLeaks created an international incident by posting online hundreds of thousands of U.S. confidential assessments of foreign leaders and states. Unless the weaknesses are resolved, "an incident similar to WikiLeaks could occur," auditors warn.
The Defense Department reissued a standard framework and markings for managing, sharing, safeguarding and disseminating technical documents. The departmentwide instruction (.pdf) applies to newly created, revised or previously unmarked classified and unclassified technical documents generated or managed by all defense-funded research, development, test and evaluation programs.
A new information security mandate effective immediately brings the Defense Department in compliance with a December 2009 Executive Order on classified national security information. Defense
Even by federal internal measures, information sharing remains a challenge, said Karen Evans, who occupied the position of federal chief information officer during most of the George W. Bush
The intelligence community has embarked on a 5 year metadata and identity management effort meant to prevent a repeat of incidents such as the WikiLeaks disclosure of State Department cables, said
A provision of the fiscal 2012 national defense authorization bill says the military may conduct offensive cyberspace operations subject to the same principles the Defense Department uses for kinetic
An executive order issued by the White House Oct. 7 tasks agency leadership with tightening security on classified information in order to protect against insider threats, while making classified
While much of the cybersecurity conversation within the federal government centers around preventing infiltration and corruption from external, malicious sources, panelists speaking July 20 at the
Congress and courts should consider intent when investigating those disseminating national security information, rather than focusing on the medium, the publisher's background or the complicity in