Posts Tagged ‘Homeland Security’

GOP Report: Govt Agencies Failing during Basic Security Precautions

Thursday, February 6th, 2014

U.S. officials have warned that a awaiting of a cyber-attack is a nation’s tip threat, nonetheless sovereign officials competence be confused to urge networks opposite even a many pledge hackers, according to a news from a Republican members of a Senate Homeland Security and Governmental Affairs Committee.

In a report, previous unsuccessful attempts by sovereign officials to secure information systems were addressed. The news cited an try to mangle into a Emergency Broadcast System final February. Television stations in Michigan, Montana and North Dakota broadcasted zombie conflict warnings, underneath a control of hackers.

Editor’s Note: 5 Shocking Reasons a Dow Will Hit 60,000

The hacked promote message: “Civil authorities in your area have reported that a bodies of a passed are rising from their graves and aggressive a living. Do not try to proceed or detain these bodies as they are deliberate intensely dangerous.”

This instance highlighted a government’s weaknesses in securing many vicious systems via a government.

U.S. officials have allocated increasing spending for mechanism confidence to conflict threats of cyber-attacks, however according to a report, even modestly learned hackers can mangle into networks given sovereign agencies are ill-equipped.

Alan Paller, who is investigate executive during a SANS Institute, a cyber-security preparation group, and reviewed a breeze chronicle of a news forward of a central recover said in a matter to a Washington Post that as a taxpayer, he is outraged.

“We’re spending all this income and removing so small impact for it,” he said.

Federal officials unsuccessful to exercise confidence patches, refurbish antivirus software, promulgate on secure networks and exercise clever passwords, a news said. Weak passwords were detected on sovereign systems, a news said.

The Obama administration has concurred a hurdles of removing agencies to secure their systems.

“Almost each group faces a cyber-security challenge,” pronounced Michael Daniel, special partner to a boss on cyber-security policy. “Some are over along than others in pushing recognition of it. It mostly depends on either they’ve been in a cross-hairs of a vital cyber incident.”

The Department of Homeland Security took a lot of critique in a report. The news unprotected a department’s disaster to refurbish essential software  —  “the elementary confidence magnitude only about any American with a mechanism has performed.”

The ranking Republican on a committee, Sen. Tom Coburn of Oklahoma, oversaw a growth of a report. “None of a other agencies wish to listen to Homeland Security when they aren’t holding caring of their possess systems,” he said. “They aren’t even doing a elementary stuff.”

The Department of Homeland Security pronounced it is addressing issues identified in a news and is operative on removing to a bottom of those problems.

“DHS has taken poignant measures to urge and strengthen a capabilities to residence a cyber risks compared with a vicious information networks and systems,” dialect orator S.Y. Lee wrote in an e-mail.

Recent cases of cyber-security have unprotected a government’s weaknesses in confidence practices.

A group of cyber confidence professionals warned that a U.S. supervision has unsuccessful to exercise fixes to strengthen a HealthCare.gov website from hackers, some 3 months after experts initial forked out a problem, Reuters reported.

David Kennedy, conduct of computer-security consulting organisation TrustedSec LLC, recently told Reuters that a supervision has nonetheless to block some-more than 20 vulnerabilities that he and other confidence experts reported to a supervision shortly after HealthCare.gov went live on Oct. 1.

“If Americans’ information is not secure, afterwards a burglary of their identities is unavoidable and dangerous,” Rep. Lamar Smith, a Republican from Texas, pronounced in a statement. “The boss should take quick movement to safeguard that a American people are not a subsequent aim of cybercriminals.”

Editor’s Note: 5 Shocking Reasons a Dow Will Hit 60,000

Related Stories:

© 2014 Moneynews. All rights reserved.

Article source: http://www.moneynews.com/Economy/cyber-security-hacker-government/2014/02/05/id/551149

HSI finds 10000 images of child porn on internal man’s computer

Saturday, December 21st, 2013

The detain of a Turlock male by Homeland Security on child publishing allegations stemmed from an examination into an general ring regulating a internet to sell pithy images of children.

Jeffrey Randall Metcalfe, 46, was taken into control Thursday morning by Homeland Security agents and arraigned currently in sovereign justice on charges of receiving and distributing child pornography.

Homeland Security’s cyber crimes core and child exploitation examination section identified a website in Jun 2012 that had been used extensively to sell images depicting child pornography. The agents were means to brand an comment called “Asmodeusthe1st” and related a internet custom chateau to Metcalfe’s Turlock residence.

“Asmodeus” is a name of a demon of lust that twists people’s passionate desires, according to Binsfeld’s sequence of demons.

Law coercion served a hunt aver during Metcalfe’s chateau on Cedar Ridge Drive Thursday morning. At a home law coercion found a mechanism used by Metcalfe that had images of “child erotica and child pornography” on a shade saver, according to a rapist complaint.

Metcalfe was during a home during a time a aver was served and was interviewed by a Homeland Security agents. He certified he had during slightest 10,000 still photos and videos depicting child publishing in his home and that his “goal” was to obtain 100,000.

The cinema includes images of tiny children of a toddler and preschool age, preteens, teenagers and some people who seemed to be adults, according to a rapist complaint. In a images children were striking in intimately pithy and striking poses and acts with other children and with adults.

During doubt Metcalfe told a agents he had a problem and had attempted to get assistance before when he was formerly convicted on sovereign charges of receiving and possessing child pornography, though that he never got any assistance. He pronounced he wanted assistance again this time, according to a rapist complaint.

Agents asked Metcalfe if he ever had an inapt passionate attribute with a child and Metcalfe was primarily wavering to answer, a rapist censure states.

One of a agents told Metcalfe that he was “asking for assistance for himself, though by not revelation us (the agents) about his victims, they would never get help.”

Metcalfe relented and gave a agents a names of dual minors. He pronounced he had a passionate attribute with a 14-year-old when he was 18 years aged and a 9 or 10-year-old when he was 30 years old.

The website Homeland Security found that led them to Metcalfe is not being publically emitted since a examination is ongoing and additional suspects could be identified and apprehended.

The agents pronounced Metcalfe’s comment was traced to 17 usernames on a website.

A examination of Stanislaus County Superior Court annals uncover a misconduct assign of possession of child publishing was lodged opposite Metcalfe in 2003, though discharged a following year.

In 1992, Metcalfe pled guilty to dual depends of first-degree custodial division by interesting dual teenager girls to go with him out of state but a accede of their parents. At a time Metcalfe was on trial in California and had been systematic to have no hit with one of a girls. He was condemned to 3 years grave trial and systematic to bear an analysis as a sex offender.

Metcalfe stays in sovereign custody. A engagement print was not released.

Article source: http://www.turlockjournal.com/section/15/article/23348/

Homeland Security during risk of mechanism breach

Thursday, December 5th, 2013

Created to guarantee a nation, a Department of Homeland Security is instead carrying problem ensuring a possess computers are stable from hacking and cybersecurity breaches, a new news says.

Agency plans, policies and systems aren’t being updated to simulate a many new threats, a potentially harmful misstep in a ever-evolving universe of online confidence where new threats can cocktail adult overnight, pronounced a agency’s examiner general.

Some DHS cybersecurity discipline date behind to 2008, and “baseline confidence pattern settings are not being implemented for all systems,” investigators said.

In addition, 47 systems are being used but “authority to operate” certificates that safeguard a many present confidence protocols are in place. Of those, 17 are systems that hoop personal tip data.

“This news shows vital gaps in DHS‘ possess cybersecurity, including some of a many simple protections that would be apparent to any 13-year-old with a laptop,” pronounced Sen. Tom Coburn of Oklahoma, a tip Republican on a Homeland Security and Governmental Affairs Committee.

“DHS doesn’t use clever authentication,” he said. “It relies on superannuated program that’s full of holes. Its components don’t news confidence incidents when they should. They don’t keep lane of weaknesses when they’re found, and they don’t repair them in time to make a difference.”

The series of cybersecurity incidents during DHS has risen 17 percent over a past year, information shows, and attacks by some-more modernized antagonistic program have risen 134 percent given 2010.

While a dialect has done many improvements recently, a IG said, many weaknesses remain, including information stored outward DHS firewalls.

The group doesn’t lane what information is being stored in open clouds, inspectors said. Plus, DHS has 67 outmost Internet connectors that could be intensity gateways for hackers to get in.

The astringency of confidence breaches depends on a inlet of a information compromised, pronounced Paul Rosenzweig, a homeland confidence researcher during a Heritage Foundation, a regressive consider tank.

“If it’s a complement that contains all of yours and cave moody information, afterwards I’m a small some-more endangered than if it’s a complement they use to buy H2O bottles for a [airport] screeners,” pronounced Mr. Rosenzweig, a former DHS official.

What’s maybe some-more troubling, he said, is a government’s inability to get a possess affairs in sequence and a justification of a problems sovereign agencies have in procuring IT services and equipment.

“We have not managed to compare a means of purchasing mechanism cybersecurity systems to a dynamic, ever-changing sourroundings that is a cyberspace,” Mr. Rosenzweig said.

Officials during Homeland Security pronounced they are operative to seaside adult a agency’s vulnerabilities.

“DHS has also taken actions to residence a administration’s cybersecurity priorities, that enclosed doing of devoted Internet connections, continual monitoring of a department’s information systems and information that support a DHS mission,” a response from a group said.

Article source: http://www.washingtontimes.com/news/2013/dec/4/homeland-security-at-risk-of-computer-breach/?utm_source=RSS_Feed&utm_medium=RSS

McAfee CTO to Lead Cybersecurity during Homeland Security

Wednesday, August 7th, 2013

By Danny Yadron

The U.S. Department of Homeland Security is set to daub a tip executive during mechanism confidence hulk McAfee, a section of Intel, as a subsequent central to conduct a cybersecurity division, several people informed with a matter said.

Phyllis Schneck, now a McAfee clamp boss and a company’s CTO for a open sector, will be picked as a subsequent emissary undersecretary of cybersecurity during a department, that takes a heading purpose in safeguarding U.S. networks from unfamiliar and domestic hackers.

A DHS central declined to comment. Reached by phone, Schneck also declined to comment.

Read a rest of a story during WSJ’s Digits blog.

 

Article source: http://blogs.wsj.com/riskandcompliance/2013/08/06/mcafee-cto-to-lead-cybersecurity-at-homeland-security/

McAfee CTO to Lead Cybersecurity during Homeland Security

Monday, August 5th, 2013

The U.S. Department of Homeland Security is set to daub a tip executive during mechanism confidence hulk McAfee, a section of Intel, as a subsequent central to conduct a cybersecurity division, several people informed with a matter said.

Phyllis Schneck, now a McAfee clamp boss and a company’s CTO for a open sector, will be picked as a subsequent emissary undersecretary of cybersecurity during a department, that takes a heading purpose in safeguarding U.S. networks from unfamiliar and domestic hackers.

A DHS central declined to comment. Reached by phone, Schneck also declined to comment.

On paper, Schneck is tasked with safeguarding American networks from cyber threats. In practice, she has to navigate a sovereign bureaucracy and energy struggles that have prevented Washington from doing that. DHS meantime has to figure out how to exercise Obama’s executive sequence this year on cybersecurity protections. It also helps pass on supervision information on specific cyber threats to Internet use providers.

Schneck has endless knowledge operative with both a open and private sectors, and is a latest instance of a government’s tighten attribute with vast confidence companies. She’s worked 14 years in a confidence attention and has a Ph.D. in mechanism scholarship from a Georgia Institute of Technology, according to McAfee’s website. For 8 years, Schneck was authority of a inhabitant house of directors for a InfraGard module during a FBI, meant to promote information pity on cyberthreats between a feds and private companies.

She faces a plea in opposed a care mess-up in Washington over how to oversee Internet security. Her predecessor, cybersecurity maestro Mark Weatherford, stayed in a pursuit for reduction than 18 months and left in April. His halt replacement, Bruce McConnell, announced his depart from DHS in July.

There have also been care shifts aloft adult a food chain. Jane Holl Lute, a former emissary secretary of homeland security, stepped down this spring. In exit interviews, Lute warned opposite Washington using cybersecurity like an comprehension program, pulling behind opposite a National Security Agency holding a lead purpose in fortifying a Internet. (See: Snowden, Edward.)

And in July, Secretary of Homeland Security Janet Napolitano announced she would step down. President Barack Obama has not nonetheless tapped her replacement.

Schneck is “smart and one of a hardest workers in a field,” pronounced Alan Paller, owner of a Sans Institute, a cybersecurity investigate and preparation program. But DHS, as an institution, lacks a “tools since they don’t have a technical skills to expostulate change,” he said.

Recently, Napolitano has led an bid to sinecure 600 hackers.

A DHS central declined to criticism on a turnover.

Article source: http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-294801/

Strange Computer Message Came with ‘Homeland Security’ Warning: Blotter

Sunday, August 4th, 2013

Midlothian police said. The message, that claimed to be entrance from a sovereign agency, sensitive a lady a mechanism was sealed due to “looking during child porn.”

The questionable warning sensitive a Midlothian lady that she would have to compensate $300 by a income send use to get her computer unlocked, military said.

The lady also believes a print of her was taken during some point, military said. A design box with her picture showed adult during a ordeal.

Are You a Fan of True Crime? Like a Crime-N-Shame Facebook page to stay on tip of a large stories and a uncanny ones. 

Article source: http://oakforest.patch.com/groups/police-and-fire/p/strange-computer-message-came-with-homeland-security-warning-blotter

Experts advise of Homeland Security fraud disabling computers

Wednesday, July 24th, 2013

 (KMOV) — Experts are warning about a mechanism pathogen that is appearing as an central supervision warning.  

The fraud pops adult as a summary from Homeland Security and totally disables a computer.  The summary warns that mechanism laws were damaged and a $300 excellent contingency be paid immediately. 

The warning page is a fraud designed to shock people. 

Computer experts contend putrescent computers need to have a pathogen private professionally and to never compensate a excellent that is demanded. 

They also advise mechanism owners keep present with antivirus software.

Article source: http://www.kmov.com/news/technology/Experts-warn-of-Homeland-Security-scam-disabling-computers-216694721.html

Government Watch: County joins Homeland Security module to accelerate …

Wednesday, April 17th, 2013

April 16, 2013

Government Watch: County joins Homeland Security module to accelerate mechanism security


By NewsPress Staff



Stillwater NewsPress
The Stillwater News Press


Tue Apr 16, 2013, 06:00 AM CDT

STILLWATER, Okla. —
Payne County commissioners assimilated a Department of Homeland Security module to accelerate mechanism confidence during a Payne County building and administration building. The plan monitors a mechanism systems for hackers. When a penetrate conflict is detected, a confidence group tries to lessen a affects online. If it can’t, a group is sent to Stillwater.

The county also supposed a $100 concession from Campbell and Associates for highway construction on Yost and Sangre roads.

It also authorized 4 permits to concede tube crossings adjacent to or underneath roads.







Text Only
| Photo Reprints


Copyright
2013
Stillwater NewsPress. All rights
reserved. This element might not be published, broadcast,
rewritten or redistributed.

Article source: http://www.stwnewspress.com/local/x1915233395/Government-Watch-County-joins-Homeland-Security-program-to-bolster-computer-security

Luring Young Web Warriors Is Priority. It’s Also a Game.

Wednesday, March 27th, 2013

“They called my relatives and told my father we was hacking their computers,” Mr. Jaska, 17 years old, recalled. He was grounded and got detention. And he is usually a form a Department of Homeland Security is looking for.

The secretary of that agency, Janet Napolitano, knows she has a problem that will usually worsen. Foreign hackers have been aggressive her agency’s mechanism systems. They have also been bustling perplexing to siphon a nation’s resources and take profitable trade secrets. And they have begun probing a nation’s infrastructure — a energy grid, and H2O and travel systems.

So she needs her possess hackers — 600, a organisation estimates. But intensity recruits with a right skills have too mostly been streamer for business, and those who do select supervision work mostly go to a National Security Agency, where they work on descent digital strategies. At Homeland Security, a importance is on gripping hackers out, or personification defense.

“We have to uncover them how cold and sparkling this is,” pronounced Ed Skoudis, one of a nation’s tip mechanism confidence trainers. “And we have to uncover them that requesting these skills to a open zone is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took tip spots during a Virginia Governor’s Cup Cyber Challenge, a undoubted smackdown of hacking for high propagandize students that was a brainchild of Alan Paller, a confidence expert, and others in a field.

With troops exercises like NetWars, a competition, a initial in a series, had some-more a feel of a video game. Mr. Paller helped emanate Cyber Aces, a nonprofit organisation that was horde of a competition, to assistance Homeland Security, and likens a agency’s need for hackers to a necessity of warrior pilots during World War II.

The office calls for a certain nonconformist attitude. “I like to mangle things,” Mr. Berman, 18, said. “I always wish to know, ‘How can we change this so it does something else?’ ”

It’s a distant opposite office — and a higher-minded one, cordial hackers will contend — than simply defacing Web sites.

“You wish people who ask: How do things work? But a really best ones spin it around,” pronounced Mr. Paller, executive of investigate during the SANS Institute, a mechanism confidence training organization.

It’s no fluke that a thought of regulating competitions came, in part, from China, where a People’s Liberation Army runs hurdles each open to brand a subsequent era of digital warriors.

Tan Dailin, a connoisseur student, won several of a events in 2005. Soon following he put his skills to work and was held violation into a Pentagon’s network and promulgation reams of papers behind to servers in China.

“We have no module like that in a United States — nothing,” Mr. Paller said. “No one is even training this in schools. If we don’t solve this problem, we’re in trouble.”

At Northern Virginia’s acclaimed Thomas Jefferson High School for Science and Technology, that both Mr. Jaska and Mr. Berman attend, there are 5 mechanism scholarship teachers, though nothing focused on security.

When 8 students voiced seductiveness in starting a confidence club, they had to convince a Raytheon worker to accommodate with them once a week. (One thought for a name, a Hacking Club, didn’t last.

“We don’t wish people who are going to go around defacing sites,” Mr. Berman said. They recently rebranded from a Cybersecurity Club to a Computer Security Club. The organisation forsaken a “Cyber” since “it sounds like you’re perplexing to be cold though you’re not,” simplified Mr. Jaska.)

Mr. Jaska and Mr. Berman listened about a Virginia foe by their school. To qualify, they had to brand bad passwords and purify adult confidence settings — a prolonged approach from a Caps Lock program.

Some 700 students from 110 Virginia high schools applied, though usually 40, including Mr. Jaska and Mr. Berman, done a cut.

So, 3 weeks ago, a span trafficked to a Governor’s Cup Cyber Challenge during George Mason University.

There, they found something they frequency confront in high propagandize — a abounding village of like-minded teenagers, a best and brightest of a rarely specialized task.

Article source: http://www.nytimes.com/2013/03/25/technology/united-states-wants-to-attract-hackers-to-public-sector.html?pagewanted=all

Luring Young Web Warriors Is a US Priority. It’s Also a Game.

Monday, March 25th, 2013

“They called my relatives and told my father we was hacking their computers,” Mr. Jaska, 17 years old, recalled. He was grounded and got detention. And he is usually a form a Department of Homeland Security is looking for.

The secretary of that agency, Janet Napolitano, knows she has a problem that will usually worsen. Foreign hackers have been aggressive her agency’s mechanism systems. They have also been bustling perplexing to siphon a nation’s resources and take profitable trade secrets. And they have begun probing a nation’s infrastructure — a energy grid, and H2O and travel systems.

So she needs her possess hackers — 600, a organisation estimates. But intensity recruits with a right skills have too mostly been streamer for business, and those who do select supervision work mostly go to a National Security Agency, where they work on descent digital strategies. At Homeland Security, a importance is on gripping hackers out, or personification defense.

“We have to uncover them how cold and sparkling this is,” pronounced Ed Skoudis, one of a nation’s tip mechanism confidence trainers. “And we have to uncover them that requesting these skills to a open zone is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took tip spots during a Virginia Governor’s Cup Cyber Challenge, a undoubted smackdown of hacking for high propagandize students that was a brainchild of Alan Paller, a confidence expert, and others in a field.

With troops exercises like NetWars, a foe had some-more a feel of a video game. Mr. Paller helped emanate a competition, a initial in a series, to assistance Homeland Security, and likens a agency’s need for hackers to a necessity of warrior pilots during World War II.

The office calls for a certain nonconformist attitude. “I like to mangle things,” Mr. Berman, 18, said. “I always wish to know, ‘How can we change this so it does something else?’ ”

It’s a distant opposite office — and a higher-minded one, cordial hackers will contend — than simply defacing Web sites.

“You wish people who ask: How do things work? But a really best ones spin it around,” pronounced Mr. Paller, executive of investigate during the SANS Institute, a mechanism confidence training organization.

It’s no fluke that a thought of regulating competitions came, in part, from China, where a People’s Liberation Army runs hurdles each open to brand a subsequent era of digital warriors.

Tan Dailin, a connoisseur student, won several of a events in 2005. Soon following he put his skills to work and was held violation into a Pentagon’s network and promulgation reams of papers behind to servers in China.

“We have no module like that in a United States — nothing,” Mr. Paller said. “No one is even training this in schools. If we don’t solve this problem, we’re in trouble.”

At Northern Virginia’s acclaimed Thomas Jefferson High School for Science and Technology, that both Mr. Jaska and Mr. Berman attend, there are 5 mechanism scholarship teachers, though nothing focused on security.

When 8 students voiced seductiveness in starting a confidence club, they had to convince a Raytheon worker to accommodate with them once a week. (One thought for a name, a Hacking Club, didn’t last.

“We don’t wish people who are going to go around defacing sites,” Mr. Berman said. They recently rebranded from a Cybersecurity Club to a Computer Security Club. The organisation forsaken a “Cyber” since “it sounds like you’re perplexing to be cold though you’re not,” simplified Mr. Jaska.)

Mr. Jaska and Mr. Berman listened about a Virginia foe by their school. To qualify, they had to brand bad passwords and purify adult confidence settings — a prolonged approach from a Caps Lock program.

Some 700 students from 110 Virginia high schools applied, though usually 40, including Mr. Jaska and Mr. Berman, done a cut.

So, 3 weeks ago, a span trafficked to a Governor’s Cup Cyber Challenge during George Mason University.

There, they found something they frequency confront in high propagandize — a abounding village of like-minded teenagers, a best and brightest of a rarely specialized task.

Article source: http://www.nytimes.com/2013/03/25/technology/united-states-wants-to-attract-hackers-to-public-sector.html?pagewanted=all