Crossroads Blog | CYBER SECURITY LAW AND POLICY

House Rejects FCC’s ‘Open’ Internet Rules

Reuters reports, in an article by Kevin Drawbaugh, dated April 8, 2011, that the U.S. House of Representatives voted to "reject Internet 'neutrality' rules that were adopted last year to keep big Internet service providers from blocking certain traffic."   The vote, which largely followed party lines, had 240 votes for removal of the rules, […]

Read More

Report: NASA Vulnerable to Crippling Cyber Attacks

The International Business Times reports, in an article by Gabriel Perna dated March 29, 2011, that a recent audit by the Office of the Inspector General found that  NASA's servers contain several vulnerabilities rendering the space agency open to a crippling cyber attack. Inspector General Paul K. Martin stated that "[w]e found that computer servers on […]

Read More

BSA, ITI, and TechAmerica Oppose Effort to Strip Funding for Trusted Identities in Cyberspace

ag-IP-news Agency, a member of Talal Abu-Ghazaleh Organization, reports in an article dated February 20, 2011, that Business Softwar Alliance (BSA) has joined TechAmerica and the Information Technology Industry Council (ITI) "in urging Congress to support development and implementation of trusted identities online."  According to ag-IP-news Agency, "the Business Software Alliance is the world's foremost […]

Read More

DoD: Military Must Be Capable Within ‘Cyber’ Domain

In an article by George V. Hulme, dated February 16, 2011, NetworkWorld reports that the "Department of Defense is set to soon complete a new cyber security strategy that will explicitly recognize cyberspace as a new and official warfare domain." The new strategy, "Cyber 3.0" will charge the military with "defending government networks just as […]

Read More

Proposal for Cyber War Rules of Engagement

In an article by Susan Watts, of BBC Newsnight, published February 3, 2011, it appears that cyber security and specific rules of engagement in dealing with a cyber attack will, for the first time, be considered at this year's annual Munich Security Conference.   "The world needs cyber war 'Rules of Engagement' to cope with […]

Read More
Please wait...