INFORMATION

Site Map - Government

RFID planning

- The Department of Defense (DoD) is using radio frequency ID (RFID) tags throughout its supply-chain operations; by January 2007, all DoD commodities will have these tags. The Government Accountability Office (GAO) reports that the Pentagon has identified many of the challenges it needs to resolve before this can happen but notes that “it has not yet developed a comprehensive strategic management approach” to guide, monitor, and assess implementation. @  Read the full GAO report at SM Online.

DOT’s Security Off Track

- When the Zotob worm appeared only days after Microsoft released a patch that would have prevented infection, 700 Department of Transportation (DOT) computers were infected after a contractor connected a laptop to the DOT’s network against the department’s policy. This incident, which is recounted in a report on the department’s IT security by the DOT’s Inspector General (IG), is just one indication that some federal IT professionals are having trouble in meeting the challenges of locking down networks. Here’s another. The IG notes that “about half of all Federal Railroad Administration computers are not subject to routine vulnerability checks because they are being used by employees who telecommute (or travel around the country) for the majority of the year.” As is made clear by the Zotob example, these laptops, “if infected with hostile software, could become conduits for spreading problems to the rest of the networks.” @ The IG’s full report is available at SM Online.

Crime Victimization

- Bureau of Justice Statistics reports on crime victimization in 2004. Read the report online.

9/11 Commission

- Two new reports from the 9/11 Commission examine the progress made on the commision's 41 recommendations.

Did You Know That?

-  Revenue from sales of chemical and biological detectors surged past $700 million in 2006, and is projected by forecaster Frost & Sullivan to reach $952 million in 2011. Purchases by the U.S. military have driven, and are expected to continue driving, these numbers.

Did You Know That?

- All 97,000 public schools in the United States are expected to receive hazard-warning radios, free of charge, from the Department of Homeland Security.

Quick Bytes: Security controls

- To comply with the government’s Federal Information Security Management Act of 2002 (FISMA), federal agencies must apply baseline security controls.

License to Kill?

- Terrorists had no problem getting driver’s licenses, which they used as identification to get airline tickets for their 9-11 attacks. That prompted Congress to pass the REAL ID Act in 2005 to force states to beef up security for licenses. Later this month or early next year the federal government will finally issue draft or interim rules telling states exactly what they need to do to be in compliance with that law, which includes only general mandates; it requires states, for example, to verify so-called breeder documents, such as birth certificates, before issuing a license, but it doesn’t say how.

First Responders

- The bill would have required that the government dole out first-responder funds based on risk. This differed from the current funding scheme which follows an equal-distribution approach, with all jurisdictions receiving funding even if those funds are not needed. The bill was designed to provide more funding for metropolitan areas that face greater risks of terrorist attack and less for rural areas.

Whistleblowers

- The bill would have prevented reprisals against government workers who publicly released information regarding waste, abuse, or gross mismanagement in the federal government.

Mail Security

- The GAO gives recommendations to the Defense Department on how to improve the response to an attack on mail facilities.

Numbers

- 14 Percentage of Arkansas trial court judges who said that their courthouses had written security policies and plans, according to a survey by the state’s Administrative Office of the Courts. Only 7 percent said they had written emergency plans for natural disasters.

Trick and Treat

- Privacy, security, and hypocrisy.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.