Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Obama urged to fast-track cyber policy
by Staff Writers
Washington (UPI) May 24, 2010


20 months in prison for ex-FBI linguist in document leak
Washington (AFP) May 24, 2010 - A former contract linguist for the Federal Bureau of Investigation was sentenced to 20 months in prison Monday for leaking classified documents to an Internet blogger, the Justice Department said. Shamai Kedem Leibowitz, 40, of Silver Spring, Maryland, was also sentenced to three years of supervised release by US District Court Judge Alexander Williams, the department said. Leibowitz, also known as Samuel Shamai Leibowitz, pleaded guilty in December to one count of disclosing classified information to an unauthorized person. Leibowitz acknowledged handing over five FBI documents concerning US communication intelligence activities to the blogger, who was not identified.

The blogger then published information from the documents. "The willful disclosure of classified information to those not entitled to receive it is a serious crime," assistant US attorney general for national security David Kris said in a statement. "Today's sentence should serve as a warning to anyone in government who would consider compromising our nation's secrets," Kris said. FBI special agent Richard McFeely said that as a "trusted member of the FBI ranks, Leibowitz abused the trust of the FBI and the American public by using his access to classified information for his own purposes." Liebowitz was employed by the FBI from January to August 2009 as a contract linguist in an office in Calverton, Maryland. He held a "top secret" security clearance giving him access to classified documents.

The Obama administration is coming under increasing pressure from industry professionals to fast-track cybersecurity policies announced a year ago.

"It's still not a plan but rather a plan to begin planning," wrote Adam Stone in a Federal Times.com survey of developments since a Cyberspace Policy Review, announced by the administration in 2009, and a nationwide cybersecurity awareness campaign last fall.

The review document explored the state of the nation's cyber defenses amid a spate of incidents involving organized hacking that affected government departmental Web sites, corporate cyberspace and public service portals.

Damage to the cyberspace was estimated to have cost tens of billions of dollars, though more figures were never revealed because of fears that disclosure would damage reputations of departments and corporate entities.

Cybersecurity officials also cited links between organized hacking, organized crime and "They are in the process of rethinking what it is that we ought to be doing," said Larry Clinton, president of the Internet Security Alliance, an association representing the information security sector. "This is probably a good way to start."

Stone said a few specifics are emerging.

"Private and public sectors will need to work in closer cooperation. Government agencies will need to implement new monitoring and defensive technologies. And federal managers will need to take a more active role in enforcing cybersecurity practices within their organizations," he said.

The Obama plan follows on from the Bush administration's Comprehensive National Cybersecurity Initiative and is believed by experts to have incorporated elements from CNCI.

Among items of interest to the federal workforce, Stone said, a 12-point CNCI summary calls for a continuation of the Trusted Internet Connections initiative, which is meant to reduce the number of connections between government computers and the Internet.

There are plans also to implement deployment of an intrusion detection system of sensors across the government.

Coordination of research and development across government needs to improve and there are plans to develop a pipeline of skilled cybersecurity employees.

Although coordination and cooperation with the private sector to address security matters of common interest is on the cards, Stone saw problems with it.

"There's wide agreement that the expertise of the private sector ought to be aligned with the security needs of government," he said, pointing out that the private sector may not yet respond positively.

"To secure our country from cyberattacks, we must have shared responsibility between the government and the private sector," U.S. Sen. Jay Rockefeller, D-W.Va., told the Business Software Alliance Cybersecurity Forum in April.

However, private sector sources cited by Stone said that industry may not be ready to work with government and vice versa.

Pat Clawson, CEO of security and vulnerability technologies firm Lumension, said, "There has been no effort in terms of ironing out the legalities."

He pointed out that regulatory and legal issues might prevent publicly held companies from sharing sensitive corporate data about activities within their networks -- data that government might need to implement security measures.

However, "There is no bridge in sight that will allow for certain types of cooperation," Clawson said.

"Today, if a company has a cybersecurity problem and wants to notify authorities, the only option is generally to call the FBI," Clawson said in a recent blog posting. "That can result in long delays and in many cases nothing gets done -- and the company ends up with negative publicity if the story gets out that there's been a security breach."

Industry sources said fear of negative publicity was one of the reasons material losses resulting from cyberattacks and hacking remained one of the great unsolved mysteries.

Banks and major corporations involved with financial transactions continue to keep a lid on losses rather than risk loss of customers with public disclosures that show them as victims of cybercrime.

Industry analysts want the government to make a start with implementing basic defensive measures such as more sophisticated scanning and robust firewalls. The technologies for implementing those measures are mature and ready to deploy, they said.

"None of this creates big privacy issues, none of this creates questions about law enforcement and jurisdiction, or questions about offensive tactical military maneuvers," said Robert Richardson, director of San Francisco's Computer Security Institute.

He said the administration's cybersecurity agenda was "just a question of will and budget."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
German minister stresses privacy rights with Google chief
Berlin (AFP) May 20, 2010
German Foreign Minister Guido Westerwelle met Google co-founder Larry Page Thursday, the ministry said, amid tensions over its controversial Street View service and the sanctity of private data. In an unusual half-hour, closed-doors meeting at the ministry with a foreign business executive, Westerwelle also took up the issue of censorship in China and other countries which have posed challen ... read more


CYBER WARS
Loral Announces Milestone in NASA Ames Project

Einstein And Einstein A: A Study In Crater Morphology

NASA Invites Public To Take Virtual Walk On Moon

LRO Team Helps Track Laser Signals To Russian Rover Mirror

CYBER WARS
Geometry Drives Launch Date For Mar Science Lab

Chinese Volunteer Chosen For Mars Test

Russia Announces Participants In Mars Flight Simulation Mission

Mars Rovers Set Surface Longevity Record

CYBER WARS
NASA Fixes Bug On Voyager 2

Aerojet Validates Engine Design For Orion Crew Exploration Vehicle

Japan rocket blasts off with 'space yacht' and Venus probe

Immune System Compromised During Spaceflight

CYBER WARS
Seven More For Shenzhou

China Signs Up First Female Astronauts

China To Launch Second Lunar Probe This Year

China, Bolivia to build communications satellite

CYBER WARS
STS-132 Crew Completes Inspection And Prepare For Landing

Crews Opening Rassvet Hatches And Prepares For Spacewalk

Atlantis astronaut complete final spacewalk

Atlantis astronauts complete second spacewalk

CYBER WARS
Ariane 5 Makes History With The ASTRA 3B And COMSATBw-2 Mission

Ariane 5 Is Poised For Launch With ASTRA 3B And COMSATBw-2

H2A Launches Six Satellites

Sea Launch Files Plan Of Reorganization

CYBER WARS
Exoplanetary System Offers Clues To Disturbed Past

Planet discovered lacking methane

'This Planet Tastes Funny,' According To Spitzer

Small, Ground-Based Telescope Images Three Exoplanets

CYBER WARS
Japanese team finds material that could make super disc

Research On Self-Healing Concrete Yields Cost-Effective System To Extend Life Of Structures

American Honour For Australian Space Tracking Stations

New Nanotech Discovery Could Lead To Breakthrough In Infrared Satellite Imaging




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement