TITLE

FBI data open to 'insider attacks'

PUB. DATE
June 2007
SOURCE
New Scientist;6/2/2007, Vol. 194 Issue 2606, p29
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article reports that according to the Government Accountability Office in Washington DC, the Federal Bureau of Investigation fails to consistently apply such standard authentication measures as passwords and biometrics to guard against unauthorised access to its computer files. All a potential data thief need do is get a job there, and so gain physical access to a computer.
ACCESSION #
25559254

 

Related Articles

  • IBM Protests FBI Biometric Award To Lockheed Martin.  // Defense Daily;3/3/2008, Vol. 237 Issue 41, p3 

    The article reports that IBM has lodged a protest with the U.S. Government Accountability Office (GAO) over its loss to Lockheed Martin for a potential $1 billion contract to develop a multi-modal biometric matching system for the U.S. Federal Bureau of Investigation (FBI). If the FBI has to...

  • TERRORIST WATCH LIST SCREENING: Opportunities Exist Enhance Management Oversight, Reduce Vulnerabilites in Agency Screening Processes, and Expand Use of the List.  // GAO Reports;10/24/2007, preceding pi 

    The article discusses the result of the investigation conducted by the U.S. Government Accountability Office (GAO) to assess the terrorist watch list formulated by the Terrorist Screening Center (TSC) of the Federal Bureau of Investigation (FBI). Based on the analysis, GAO stresses the...

  • TERRORIST WATCH LIST SCREENING: Recommendations to Enhance Management Oversight, Reduce Potential Screening Vulnerabilities, and Expand Use of the List.  // GAO Reports;10/24/2007, preceding p1 

    The article focuses on the recommendation stressed by the U.S. Government Accountability Office (GAO) after investigating the terrorist watch list formulated by the Terrorist Screening Center (TSC) of the Federal Bureau of Investigation (FBI). GAO mentions several actions to promote a...

  • Information Security: FBI Needs to Address Weaknesses in Critical Network: GAO-07-368. Wilshusen, Gregory C.; Rhodes, Keith A. // GAO Reports;5/24/2007, p1 

    The Federal Bureau of Investigation (FBI) relies on a critical network to electronically communicate, capture, exchange, and access law enforcement and investigative information. Misuse or interruption of this critical network, or disclosure of the information traversing it, would impair FBI's...

  • Continued Attention Needed to Protect Our Nation' Critical Infrastructure. Wilshusen, Gregory C. // GAO Reports;7/26/2011, preceding p1 

    The article reports on the improvement of cybersecurity in the U.S. It notes that the Government Accountability Office (GAO) has found out that the threats to systems which support critical infrastructures are growing and evolving. It cites a February 2011 testimony from the Director of National...

  • Playing with Trucks; Playing for Keeps. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2007, Vol. 44 Issue 4, p12 

    The article reports on the plan of the Department of Homeland Security (DHS) to install radiation detection devices in major cities in the U.S. The DHS action was influenced by the security problems in the country revealed by the Federal Bureau of Investigation (FBI) and the Government...

  • CYBER SLEUTHS. Moore, Carole // Career World;Sep2005, Vol. 34 Issue 1, p6 

    Focuses on the role of cybersecurity specialists in the prevention of computer hackers and cyberterrorists. Requirements set by the U.S. Federal Bureau of Investigation for employing cybersecurity experts; Range of salary being received by cybersecurity analysts; Types of computer crimes...

  • DUMB HACKERS.  // APC (Bauer Media Group);Jun2012, Vol. 32 Issue 6, p25 

    The article reports on computer hackers who got arrested for the dumb mistakes they made. Higinio O. Ochoa III, an alleged member of CabinCr3w, a sub-group of the Anonymous collective, is due in court, as he was caught after posting the pictures of his Australian girlfriend on Twitter. The U.S....

  • BEYOND THE BREACH. Sternstein, Aliya // Government Executive;Sep2013, Vol. 45 Issue 6, p26 

    The article focuses on the security needed for computer crimes. It states the Federal Retirement Thrift Investment Board is looking over to pay price for stronger security. It further mentions about the Thrift Savings Plan break-in and investigation of the data taken from this plan that require...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics