Why 2012 is starting to look like 1984

Why 2012 is starting to look like 1984
Digitaltrends.com - SOPA - NDAA - Telecom Immunity
The bottom line here is that it doesn’t matter whether the U.S. government ever exercises the powers granted under this year’s NDAA (which Obama has signed into law): the very fact they exist suppresses American civil liberties by explicitly authorizing the indefinite detention of U.S. citizens without trial, anywhere in the world. For folks who hold unpopular views, or merely know people who do, that’s a sobering thing to consider....Suddenly, everyday Internet users speaking up in support of groups like Anonymous and Wikileaks might find themselves accused of aiding and facilitating terrorists. Similarly, if U.S. authorities decide these or similar groups’ activities constitute terrorism, members or alleged members might find themselves shipped to Guantanamo. No trial, no process, no appeal

NDAA | American Civil Liberties Union » Blog of Rights: Official Blog of the American Civil Liberties Union: "We are extremely disappointed that President Obama signed this bill even though his administration is already claiming overly-broad detention authority in court. Any hope that the Obama administration would roll back those claims dimmed today. Thankfully we have three branches of government, and the final word on the scope of detention authority belongs to the Supreme Court, which has yet to rule on the scope of detention authority. But Congress and the president also have a role to play in cleaning up the mess they have created because no American citizen or anyone else should live in fear of this or any future president misusing the NDAA’s detention authority. The ACLU will fight worldwide detention authority wherever we can, be it in court, in Congress, or internationally."

National Defense Authorization Act Outrage Continues To Grow Online:This is day three of living in post-NDAA America. In case you've been living under a particularly large and comfy rock, the NDAA is a radical and dangerous bill -- which Barack Hussein Obama quietly signed into law on New Year's Eve, while almost every American was preoccupied with New Year's binge drinking. (His administration had previously vowed to veto the NDAA, before strangely reversing course and signing it into law. He issued a signing statement saying his administration would not use the controversial indefinite detention provisions. This promise, however, is not legally binding -- and it also does not prevent future Presidents from detaining and torturing American citizens without the right to a trial or attorney, and without bringing formal charges against them. The signing statement is the legal equivalent of a Post-it note affixed to a manuscript.) How bad is this law, really? Here are some experts:
Presidential candidate Ron Paul on NDAA: "...bold and dangerous attempt to establish martial law in America."
Rep. Justin Amash: NDAA was "carefully crafted to mislead the public."
Amnesty International: "Provisions that were snuck into the bill with little notice from mainstream media could spell indefinite detention without a hearing, keep Guantanamo open, and hinder fair trials."
And Americans, despite some pro-Obama spin to the contrary, are definitely targeted by NDAA's indefinite detention provisions. As Salon columnist and constitutional lawyer Glenn Greenwald explained: "Myth #3: U.S. citizens are exempted from this new bill: This is simply false, at least when expressed so definitively and without caveats. The bill is purposely muddled on this issue which is what is enabling the falsehood."
The American broadcast media has been eerily silent on NDAA's passage into law, despite the fact that foreign newspapers and broadcast networks have been covering this as one of their top international stories. . . Read more: http://www.businessinsider.com/ndaa-outrage-continues-to-grow-online-2012-1#ixzz1idhHyYdJ

Overlapping criminal and state threats pose growing cyber security threat to ...
ZDNet (blog)
By Dana Gardner | January 4, 2012, 1:23pm PST Summary: I've met really good cyber investigators for the Secret Service and the FBI, but I've yet to meet one that thinks he's going to get promoted for calling a press conference and announcing that they can't catch anyone...

Cyber security guidelines soon
Gulf Times
Qatar's IT regulators are about to issue a package of policies and guidelines to bring security measures up to international standards and promote best practices in risk management and change management and information and security governance structure ...

Sarasota City Audit Finds Potential Criminal, Civil Violations
Patch.com
Cyber security firm Sylint Group finds serious flaws with the city's IT Department and systems. By Charles Schelle A forensic analysis of the City of Sarasota's e-mail network, information technology department and other computer files have revealed ...

Virtual worlds training for federal cyber pros in the works
FCW.com
In July 2010, the departments of Homeland Security and State kicked off an initiative that provides training to federal cybersecurity professionals from 55 offices and agencies. The FederalCybersecurity Training Event program offers sessions to ...

Hackers post more data taken from Stratfor; Kissinger, Quayle among those affected
Austin American-Statesman
A cyber security expert told the newspaper that personal and business information for thousands of military personnel, law enforcement officials and intelligence officials was part of the customer information that was stolen when the Austin company's ...

GCHQ awards bonuses to stop IT security experts leaving
ComputerworldUK
According to the jobs section of the GCHQ website, a cyber security specialist can earn a salary of between £25446 and £31152. Wikileaks - fearless whistleblowers or irresponsible nuisances? Keep up to date with the latest developments. ...

Cyberthreats evolve, start-ups responding
Total Telecom
One thing those breaches exposed is that the last-generation of cyber-security tools was designed for a different class of threats and a different information technology architecture. As a result, they are losing ground to the bad guys. ...

Top 11 Trends for 2012 in Healthcare Data, According to Industry Experts
PR Newswire (press release)
A covered entity will need to enter into a carefully written business associate agreement with a cloud computing vendor before disclosing protected health information and should ensure that it has adequate cybersecurity insurance to cover the direct ...

Pentagon Solutions: NDU iCollege team talks Stuxnet, cyber threats
FederalNewsRadio.com
A team from the National Defense University's iCollege, which was recently honored by the the Defense Department's chief information officer for a special cybersecurity workshop, joined Pentagon Solutions. The event hosted more than 200 people from the ...

Answers to 2011 Gov't IT Security Quiz
GovInfoSecurity.com
E: White House Cybersecurity Coordinator Howard Schmidt's principal adviser. Chris Painter served as acting cybersecurity coordinator as President Obama searched for a permanent infosec adviser in 2009 and the first few weeks of 2010. ...

GovInfoSecurity.com

Consultant suggests top Sarasota officials broke law
Sarasota Herald-Tribune
... provide substantial reason to believe that potential statutory violations (both criminal and civil) have occurred," wrote Sylint CEO John Jorgensen, a former National Security Administration employee who started the cyber-security firm in 2000. ...

Increasing access to government data our goal Vivek Kundra, US CIO
Siliconindia.com
"However, we are also focusing on cyber security and hence will release as much information as possible without compromising national security or individual privacy," he said. "We would rather not wait for the public to ask for information, ...

NAVY Cyber Battlefield Hardened by Industry Leading Training at ACE
EIN News (press release)
For information on Navy Cyber Security training courses, visit their website or call (888) 236-1411. Reach our readers and post your press release. Accounting, Tax & Payroll Services. Enjoy your business, leave the paperwork to us....

Saudi hackers target Israeli credit card details
Channel 4 News
But one cyber security expert told Channel 4 News the incident is probably nothing more sinister than a "corporate information breach". Dov Kotler, CEO of Israel's largest card company, Isracard, said most of the 400000 credit card numbers were ...

Channel 4 News

SF Chamber of Commerce raises supervisors' grade
San Francisco Chronicle
One other concern: "IT risk," ie, as companies become ever more dependent on their technological infrastructure, is enough attention being paid to cyber security issues? Probably not, said 90 percent of senior executives and board members at the ...

Malaysia: Look Ahead to 2012 - Part 2
MIS Asia
... and followed by top executives in Malaysia from companies that include Intel, Dell, Nokia Siemens Networks, JARING Communications, Brocade, Avaya, Interactive Intelligence (ININ), Emerson Network Power, Dataprep Holdings, CyberSecurityMalaysia, ...

MIS Asia

Chidambaram launches intranet prahari project for BSF personnel
Economic Times
Sufficient cyber security measures to ensure network security and to prevent data loss or pilferage have been incorporated. The system will facilitate operational analysis, efficient planning in the domain of procurement, finance and manpower ...

Tropos Mesh OS Release 7.7 Brings Enterprise-Class Security to Field Area ...
MarketWatch (press release)
"Tropos Mesh OS Release 7.7 makes it easier for utilities to meet and exceed cyber securityrequirements," said Roman Arutyunov, Vice President of Product Development for Tropos Networks. "Tropos customers can quickly and simply secure their networks ...

United States Coast Guard Standardizes on Avaya
MarketWatch (press release)
Avaya Government Solutions leverages its professional services capabilities and cyber-securityexpertise to create technology platforms that streamline inter-agency communications and bring the right people together in the right context with the ...

10 Technologies That Will Change Your Business in 2012
BusinessNewsDaily
Cybersecurity - Cyberattacks are nothing new, but the way in which businesses handle them and the attention which businesses pay to them is expected to increase in the new year. IPv6 Migration/Implementation– As the traditional IPv4 database has now ...

BusinessNewsDaily

The importance of Internet Network Security to Big Enterprises
Business 2 Community
The most compatible cyber security tool especially designed for the organizations is the next generation firewall. Businesses need the ultimate flexibility of the next generation firewall to be able to distribute the work to match their infrastructure ...

Entrepreneurs are the saviours of British innovation, say experts
inspiresme.co.uk
Within its Growth Review recently, the Government announced some measures to help SMEs in procuring Government contracts and vowed to assign at least 25 percent of Government cyber security contracts to smaller companies. Steve Walsh, managing director ...

Privacy Group Fights To See Google-NSA Communiques
Law360 (subscription)
... 7:21 PM ET) -- A privacy watchdog asked the DC Circuit on Tuesday to force the National Security Agency to respond to a Freedom of Information Act request for materials related to a purportedcybersecurity agreement with Google Inc. In a brief, ...

Thousands of Aussie Teens Inadvertently Reveal Numbers Online
International Business Times AU
Cyber security expert Susan McLean told Fairfax said Facebook users across all ages and were disclosing their numbers without even realising it. "It never ceases to amaze me that people don't tend to think," she said. "Most of these people wouldn't ...

International Business Times AU

Retraining programs get unemployment bump
The Jewish Journal of Greater L.A.
In response to the increasing need, JVS partnered with local community colleges to offer programs incyber-security and green construction, and changed their BankWorks program from an eight-week course to six weeks. They have also focused attention on ...

McDonnell seeks $37M more for economic development in Va.
The Virginian-Pilot
It also proposes funding for modeling and simulation and cyber security initiatives, tourism promotion, an advanced manufacturing effort, and job training programs, among other items. At the governor's request, lawmakers have already approved about ...

Arvind Gupta takes over as Director General of IDSA
NetIndian
He has three books, several edited books and a number of academic publications to his credit. He has been a member of several task forces on issues such as space security, climate change, cyber security, nuclear disarmament and so on.

Cyber Security Trends and Challenges for 2012 « Techno-News Blog
By admin
Cyber Security Trends and Challenges for 2012. By eWEEK. The severity, volume, and even the sophistication of cyber attacks is increasing, with very expensive and sometimes devastating results. Millions of records are lost or stolen, ...
Techno-News Blog

Deloitte Hiring Cybersecurity / Information Assurance (IA) Engineer ...
By Lexxio
Cybersecurity / Information Assurance (IA) Engineer- Senior Consultant. Deloitte is presently hiringCybersecurity / Information Assurance (IA) Engineer- Senior Consultant in Springfield Virginia: Thursday, January 5, 2012 10:10:22 GMT.
Lexxio » Latest Jobs In City: Pelham

Follow up from eTrade spam – Bank of America spam - Terry Zink's ...
By tzink
Follow up from eTrade spam – Bank of America spam. MSDN Blogs > Terry Zink's Cyber SecurityBlog > Follow up from eTrade spam – Bank of America spam. Follow up from eTrade spam – Bank of America spam. tzink. 4 Jan 2012 10:47 AM ...
Terry Zink's Cyber Security Blog

What will protect your business from cyber crime? | IT Governance ...
By Melanie Watson
Modern businesses and organisations must protect themselves from the growing threat of cyber attacks and cyber crime; Cyber security is a senior management issue not just an IT issue; Protection of your critical assets should cover systems, ...
IT Governance Blog on IT governance,...

Securing National Critical Infrastructure: Cybersecurity Awareness ...
Securing National Critical Infrastructure: Cybersecurity Awareness & Workforce Education Innovation. The Global Institute for Cybersecurity and Research ...
www.prlog.org/11756498-securing-national-critical-infrastruc...

Cyber Security Subject Matter Expert VAS - Cooper Nuclear Station ...
Cyber Security Subject Matter Expert SCOPE OF WORK Provide cyber security consulting services at Cooper Nuclear Station. Services may include, but not be ...
www.nukeworker.com/job/view.php?job_id=17219

US-CERT Cyber Security Bulletin SB11-360 -- Vulnerability ...
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology ...
www.us-cert.gov/cas/bulletins/SB11-360.html

Raytheon Makes Another Cyber Security Acquisition | SecurityWeek ...
Raytheon Expands Cyber Security Capabilities With Acquisition of Henggeler ... This marks Raytheon's 10th cybersecurity-related acquisition since 2007. ...
s1.securityweek.com/raytheon-makes-another-cyber-security-a...

Lifting the Security Burden: A Cybersecurity Strategy for the Public ...
By the Center for Digital Government Read this issue brief to find out how government can effectively address cybersecurity issues and develop a ...
www.govtech.com/.../Lifting-the-Security-Burden-A-Cybersec...

5 reasons cybersecurity matters to small businesses | CY.TALK ...
Security is absolutely positively the most important infrastructure that small companies need to make and here are 5 reasons why.
security.cytalk.com/.../5-reasons-cybersecurity-matters-to-smal...

ESET CyberSecurity for Mac 2012 - TopTenREVIEWS
ESET CyberSecurity for Mac is a Mac internet security application that provides a basic layer of protection for your Mac from dangerous threats that lurk online.
mac-internet-security-software-review.toptenreviews.com/eset-...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com