Homeland Security


Even with good cell service, emergency crews might need satellite

Paulding County, Ga., gets good broadband connectivity over cellular service for its mobile command center, but it is considering satellite communications as a backup service.

Report: Attacks on gas pipeline networks linked to RSA hack, China

Digital signatures used in the spear-phishing campaign against the natural gas industry are identical to those used in the RSA breach, according to a published report.

The best mobile apps: Simple, easy to use, ready to reuse

CIOs describe what works with mobile application development at NASCIO's Mid-year Conference.

DHS R&D program has a disconnect with first responders' needs, House panel told

The department has a program to help develop technology for first responders, but matching the money with state and local agencies' requirements has proved difficult.

Spear-phishing attacks hit gas pipeline networks

DHS alerts operators that "tightly focused" attacks, ongoing since at least December, have compromised a number of organizations.

911 services face an emergency of their own

People are moving quickly to mobile devices and relying on text and video rather than voice. Can Next-Gen 911 catch up?

FCC's 5-step plan for deploying Next-Gen 911

The Federal Communications Commission's road map for the transition to a new generation of 911 services starts with location accuracy.

FBI seeks to expand wiretap law to social networks, IM, webmail

The FBI has drafted a proposal that would require social networking, webmail and IM sites, as well as voice-over-IP providers, to make their sites wiretap-ready, and it is asking those companies not to oppose the measure.

FEMA: Cybersecurity ranks lowest among critical protections

The National Preparedness Report from FEMA puts cybersecurity at the bottom of the readiness list, with fewer than half of states prepared to defend IT systems and networks.

Cyber crime-fighters: A model for international cooperation?

Current international collaboration against online criminals could offer a template for broader cooperation on cybersecurity, although law enforcement has challenges of its own.

World War I Dazzle Painting

WWI 'dazzle paint' fools face recognition scanners

An artist finds that the same approach used in World War I to confound the rangefinders on attacking ships will prevent a facial scanner from recognizing you.

Conficker returns, exploiting weak passwords on network systems

Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.

Security pros not ready for attacks, still don't want government regs

Respondents in a new survey expect to be hit by cyberattacks and have failed to adequately secure their systems, but they also do not want government regulation.

Major cyberattack on US 'inevitable,' experts tell Congress

Without government mandates to secure critical infrastructure, a damaging cyberattack on the nation will happen, experts tell a House panel.

Server yields no clues to U. of Pittsburgh bomb threats

A server seized in connection with a series of bomb threats directed at the University of Pittsburgh won't help authorities find the person responsible.