CyberEye

William Jackson

Bill Jackson (bjackson@1105govinfo.com), a senior writer for GCN, covers security issues.


Can we fight cyber crime like the Untouchables fought Capone?

Recent successful legal action against the Waledac botnet offers some hope that lawyers might succeed where technology has failed in the war against cyber crime.

DOD's response could be driving traffic to WikiLeaks

Traffic data shows that government briefings and other activities could be driving traffic to the controversial WikiLeaks site that leaked documents about the war in Afghanistan.

Malware's role in fatal 2008 air crash

Contrary to some reports, malware did not cause the 2008 Spanair crash that killed 154 people. But an infected computer could have contributed to failures in the airline maintenance system that might have helped prevent the crash.

Does NSA's cybersecurity mission extend to the dot-com domain?

NSA appears to be suffering from a case of mission creep as it extends its reach from the .mil Internet domain into critical infrastructure that traditionally has been outside the military’s direct control.

The pros and cons of government cybersecurity work

A couple of old-line security pros warn that cybersecurity jobs – especially in government – are likely to be frustrating for qualified hackers. But there also are some upsides to the work.

Cyber Command still struggling to define cyber war

The Cyber Command is charged with conducting and defending against cyber warfare, but we don’t really know what we’re doing yet in cyberspace, says former CIA director Gen. Michael Hayden.

Could WikiLeaks set back the cause of information sharing?

Former CIA director Michael Hayden says the recent posting of classified material about the war in Afghanistan exposes the risks of information sharing among intelligence agencies. But the government’s use of IT could be a bigger threat to personal privacy.

Cybersecurity boot camps are a start toward a skilled workforce

A year after the launching the U.S. Cyber Challenge, three universities are wrapping up the first series of security boot camps aimed at recruiting college students into the ranks of security professionals.

Cybersecurity is hot on campus

Cybersecurity is a growth industry, and the first-of-their-kind degree programs at the University of Maryland are attracting hundreds of applicants.

Public-private effort on cybersecurity needs a push from Congress

The cooperation of government and the private sector is necessary for security in cyberspace, but it might not be feasible without some regulatory muscle.

Internet security quietly reaches a milestone

The availability of DNSSEC signed root zone for the Internet is a critical step toward creating a more secure information infrastructure.

How spammers are like a force of nature

Spammers apparently abhor a vacuum, and as soon as one network of spambots is shut down, the volume produced by surviving networks expands to fill the void.

Why you should say no to some new technologies

Hardware and software tools for securing new technologies can be easy to develop. But effective policy is what drives security.

Don't be too quick to dismiss FISMA

A grass-roots reform of federal IT security practices is under way that has nothing to do with legislation, says the director of NIST's FISMA implementation program.

The spooks have an acronym for it

The intelligence community’s Intellipedia is gaining acceptance with analysts and advisers, as a growing catalog of acronyms shows, although not to you.