Feds to Take a Bite Out of Cybercrime
- INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY "HACKTIVISM" CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM. Kelly, Brian B. // Boston University Law Review;Oct2012, Vol. 92 Issue 5, p1663
This Note recommends that Congress draft cybersecurity reform legislation in line with President Obama's May 2011 Cybersecurity Legislative Proposal, rather than the House Republican Cybersecurity Task Force's October 2011 Proposal. The former proposal's emphasis on centralized regulation under...
- Untitled. Ashford, Warwick // Computer Weekly;11/23/2010, p70
The article focuses on a legislative bill announced by several Democrats in the U.S. House of Representatives through which the cybersecurity powers of the Department of Homeland Security (DHS) would expand.
- Senate Leaders Push Cybersecurity Legislation. Rutherford, Emelie // Defense Daily;6/15/2010, Vol. 246 Issue 53, p6
The article offers information about the legislation regarding cybersecurity in the U.S. Department of Homeland Security (DHS). It states that according to a new legislation, DHS will be made responsible for the protection of civilian networks. Also stated about the issue of the new Protecting...
- Senate cybersecurity bill would allow firms to appeal regulations. Nagesh, Gautham // Hill;2/14/2012, Vol. 19 Issue 19, p12
The article reports on the comprehensive cybersecurity bill, which will be introduced by the leadership of the U.S. Senate Homeland Security Committee on February 21, 2012, that would allow firms to appeal whether new security regulations should apply to their sector in the U.S.
- DHS to state its case to business. Carlson, Caron // eWeek;10/24/2005, Vol. 22 Issue 42, p20
The article informs that to persuade the commercial owners of critical infrastructure to invest in more secure networks, the U.S. Department of Homeland Security (DHS) is planning to show the bottom line in 2006. Andy Purdy, acting director of the DHS' National Cyber Security Division, told...
- Secret Service To Develop National Computer Forensic Institute. // Defense Daily;3/15/2007, Vol. 233 Issue 49, p6
The article reports on the plans of the U.S. Department of Homeland Security and the state of Alabama to establish a National Computer Forensic Institute to be developed by the Secret Service. According to the author, the institute will be providing training for cyber crimes to federal, state...
- The 2008 IT Report Card. HOGAN, HANK // HS Today;Sep2008, Vol. 5 Issue 9, p19
This article presents the highlights of the 2008 annual computer security report card of the U.S. Department of Homeland Security (DHS). In March, DHS sponsored CyberStorm II, the largest cybersecurity exercise ever organized. Currently, as of September 2008, DHS is initiating the deployment of...
- Pentagon, DHS Working Cybersecurity Pilot Program. Munoz, Carlo // Defense Daily;3/18/2011, Vol. 249 Issue 52, p2
The article offers information on the Cybersecurity Pilot Program being run by the U.S. Department of Defense (DoD) and the Department of Homeland Security (DHS). It is stated that DoD and DHS are working on a new joint effort to protect several defense industry networks from cyber crimes. Under...
- Newscan: DHS says drug traffickers are spoofing border drones. // Urgent Communications Exclusive Insight;12/28/2015, p1
The article offers news briefs in the U.S. as of December 28, 2015 including use of drone aircrafts by the U.S. Department of Homeland Security (DHS) for monitoring of illegal drug transactions, factors contributing to self-driving cars and prevention for cyberattack crimes.