White House proposal would ease FBI access to records of Internet activity. Oath of office. An oath of office is an oath or affirmation a person takes before undertaking the duties of an office, usually a position in government or within a religious body, although such oaths are sometimes required of officers of other organizations.
USA PATRIOT Act. Het moment dat de USA PATRIOT Act wordt getekend door George W.
Bush. Daniel Ellsberg at Google. Introducing the New Cybersecurity Coordinator. Macon Phillips December 22, 2009 07:30 AM EDT Today the White House announced the President’s new White House Cybersecurity Coordinator, Howard Schmidt.
President Barack Obama greets his new White House Cyber Security Chief Howard A. Schmidt in the Cross Hall of the White House. Habeas Corpus Act. Langston Hughes. Let America be America Again by Langston Hughes. Top Secret America. The Washington Post (PostTSA) Top Secret America: Interactive map. NSA National Security Agency. Former NSA executive Thomas A. Drake may pay high price for media leak. F or seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges: exploiting the digital data revolution and countering terrorism.
Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Drake, 53, may pay a high price for going nuclear.
An NSA spokeswoman declined to comment for this article, saying the agency cannot discuss an ongoing criminal case. National Counterterrorism Center (NCTC) Counterterrorism Calendar. Defense Security Service (DSS) Internet Homepage - Flash Version. Truth About the Polygraph. An FBI backdoor in OpenBSD? Robert McMillan: An bit more information fr... FBI-backdoors in veiligste BSD-variant. Spies and Spooks: The (Mis)Adventures of the CIA - Photo Essays. Obama threatens to veto greater intelligence oversight - Glenn Greenwald. Pelosi Deadlocks Over Intelligence Oversight Bill. Nancy Pelosi and Barack Obama are unlikely political foes, but the House Speaker is in the middle of an ugly fight with the President — as well as the CIA and powerful House and Senate Democrats and Republicans — about Congress's watchdog powers over the U.S. intelligence services.
Bucking a veto threat by Obama and overruling a deal among the White House, Republicans and two Democratic committee chairmen, Pelosi is pushing to dramatically expand congressional oversight of the CIA and other intelligence agencies. At issue is Congress's ability to monitor the intelligence programs deemed most sensitive and closely held by the Executive Branch. National Security Letter Recipient Can Speak Out For First Time Since FBI Demanded Customer Records From Him. August 10, 2010 FBI Partially Lifts Gag Order In ACLU Case FOR IMMEDIATE RELEASE CONTACT: (212) 549-2666; email@example.com NEW YORK – The FBI has partially lifted a gag it imposed on American Civil Liberties Union client Nicholas Merrill in 2004 that prevented him from disclosing to anyone that he received a national security letter (NSL) demanding private customer records.
Pentagon creates 'cyber command' for waging online warfare. America has confirmed that it will be creating a new Pentagon "cyber command" to bring together the country's various hi-tech military units under one roof.
US defence secretary Robert Gates ordered the formation of the group earlier today, following a period of debate over the best way to defend the country from attacks over the internet. The command - which will unite a string of organisations run by the army, navy, air force - plans to tie them together into a single, coherent group that is able to both defend the United States from information warfare and strike out at hostile nations if necessary. The Department of Defence said that the group is set to begin operating later this year, and plans to be fully operation by October 2010. The move comes amid growing concern over the possibility of and the threat of cyber-espionage - including perceived attacks from inside China and Russia.
FBI to Wikipedia: Remove our seal. The FBI's seal, shown here in a photograph, is the subject of a legal dispute between the bureau and Wikipedia. The FBI threatens Wikipedia with legal action over the use of its sealWikipedia says it will not remove the FBI seal from an entry on the federal agencyFBI claims website duplicated its seal without permission, in violation of federal law (CNN) -- The U.S.
Federal Bureau of Investigation has threatened Wikipedia with legal action if the online encyclopedia doesn't remove the FBI's seal from its site. The seal is featured in an encyclopedia entry about the FBI. Wikipedia isn't backing down, however. UK Home Page. AIVD - Home. AIVD faalde rond Irak - Binnenland - Telegraaf.nl [24 uur actueel, ook mobiel] [binnenland] Wijzigingen in de Telecommunicatiewet maken dat iedere website de verplichting heeft te informeren over het gebruik van cookies.
AIVD-affaire: een lekkend stel. Ze zouden staatsgeheimen hebben gelekt naar ‘De Telegraaf’ en staan binnenkort voor de rechter. Advocaat wil Balkenende laten getuigen in AIVD-zaak. Rechtbank weigert premier als getuige. AIVD-werknemer Heleen S. en haar partner Hans H. stonden deze week voor de rechtbank wegens schending van het staatsgeheim. Vrijspraak voor AIVD'ers. House Passes Cybersecurity Bill - The Caucus Blog. Update | 12:46 p.m.
The House today overwhelmingly passed a bill aimed at building up the United States’ cybersecurity army and expertise, amid growing alarm over the country’s vulnerability online. The bill, which passed 422-5, requires the Obama administration to conduct an agency-by-agency assessment of cybersecurity workforce skills and establishes a scholarship program for undergraduate and graduate students who agree to work as cybersecurity specialists for the government after graduation. Bipartisan Policy Center. Sprint fed customer GPS data to cops over 8 million times. Christopher Soghoian, a graduate student at Indiana University's School of Informatics and Computing, has made public an audio recording of Sprint/Nextel's Electronic Surveillance Manager describing how his company has provided GPS location data about its wireless customers to law enforcement over 8 million times.
That's potentially millions of Sprint/Nextel customers who not only were probably unaware that their wireless provider even had an Electronic Surveillance Department, but who certainly did not know that law enforcement offers could log into a special Sprint Web portal and, without ever having to demonstrate probable cause to a judge, gain access to geolocation logs detailing where they've been and where they are. The fact that federal, state, and local law enforcement can obtain communications "metadata"—URLs of sites visited, e-mail message headers, numbers dialed, GPS locations, etc. Yahoo Issues Takedown Notice for Spying Price List. Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web.
Cryptome. Virgin Media becomes the first UK ISP to test a filesharing moni. 27 November '09, 12:28am Follow.
S.3480: Protecting Cyberspace as a National Asset Act of 2010 - OpenCongress Summary Creates the Office of Cyberspace Policy and National Center for Cybersecurity and Communications to set standards and coordinate cybersecurity efforts within the government. Protecting cyberspace comes at a cost. New Bill Would Let Obama Police Internet for National Security R. Senate Committee on Homeland Security and Governme.
Cyber War - The Aurora Project. Cyber attacks are criminal. The internet, electronic communications channels and computer technology that controls critical infrastructure together represent a new combat front on the international political stage. Several nations have been accused recently of cyber attacks, not least Russia and China, on the data centres of other governments. Whole power supply systems have been compromised on occasion and even multinational corporations, such as Google, have seen their normal operations undermined by activity at the national level.
Britain joins cyber-security race. Fake femme fatale shows social network risks.