News in Brief

DOD and climate, Anonymous threats, cyber NATO and more

GAO: DOD could do more with climate data

The Defense Department could do a better job of using data to respond to the challenge of climate change, the Government Accountability Office said in a report it publicized this week.

DOD could collect as many as 580,000 pieces of data in its survey of facilities vulnerable to climate change, according to the report.

"Service officials generally agree that they could use these data to correlate the historical frequency of a certain impact—-- such as flooding -- to a certain level of vulnerability," the report states. "However, they have not established a methodology to conduct their suggested analysis and do not have milestones to guide any such efforts through completion."

Hacker group Anonymous threatens lawmakers

The hacktivist group Anonymous used a YouTube video to threaten congressional supporters of the proposed Cybersecurity Information Sharing Act. The video called the bill, a draft of which has been released by Senate Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.), "a direct attack against the Fourth Amendment of the Bill of Rights" and threatened lawmakers and others supportive of the legislation with undefined retaliation.

The House has a companion bill in the works, and House Intelligence Committee Chairman Mike Rogers (R-Mich.) has said he is optimistic about the legislation passing this year.

This is not new behavior by Anonymous. The group allegedly threatened Rep. Dutch Ruppersberger (D-Md.) for his support of cybersecurity legislation last year.

Collective defense now includes cyber

NATO has updated its collective defense policy to include cybersecurity, IT news outlet ZDNet reported. Article 5 of the NATO charter can be interpreted to mean that a cyberattack on any member is an attack on the entire alliance, according to a NATO official quoted by ZDNet. It is unclear how big an attack would need to be to trigger a response.

Cyberattacks are becoming a staple of modern warfare and have hit NATO members and aspiring members in recent years. Estonia, a NATO member, accused Russia of carrying out distributed denial-of-service attacks in 2007. The Russians allegedly struck again in the cyber realm during fighting with Georgia in 2008.

Census testing tech in national capital region

Although the decennial census is six years away, the Census Bureau is doing its first significant test of the technologies and methods it is planning for the 2020 count.

This summer, the bureau will conduct the 2014 Census Test in parts of Washington, D.C., and Montgomery County, Md., from the end of June through September. The test will use Internet, telephone and traditional paper questionnaires to collect data.

The bureau is exploring alternative ways of conducting the census after several reports from the Government Accountability Office highlighted the inefficiencies of past counts, according to GAO's "WatchBlog."

Auditors have recommended prioritizing IT research and testing, such as using smartphones and online surveys. GAO reported in April that the bureau hadn't created sufficient plans and schedules for developing testing projects and IT-related research for the 2020 census.

Flappy Bird infested with malware

Beware of Flappy Bird. That's one of the messages in McAfee's June threat report.

Mobile malware creators have found ways to tap into the growing popularity of the game to attack mobile devices used by consumers, government and industry. The malware gets users to unknowingly open up permissions on smartphones and tablet computers to attackers.

The Flappy Bird mobile game enjoyed a meteoric rise in popularity between last year and this past February, when its owner shut it down.

Despite Flappy Bird's mercurial rise and fall, McAfee said enterprising cybercriminals developed hundreds of clones containing malware based on the hugely popular game. Officials at McAfee Labs said they sampled 300 of the clones and found that almost 80 percent carried malware. Some of the activities included making calls without the user's permission; sending, recording and receiving SMS messages; extracting contact data; and tracking geolocation.

In the worst cases, the malware gained root access, allowing uninhibited control of anything on the mobile device, including confidential information, McAfee officials said.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Wed, Jul 2, 2014

DOD would do the taxpayers and this country a big favor if they did NOT make any decisions based on "climate change". They should deal with climate based on the thousands of years of understanding we have with it rather than this political and money stealing scam that has been going on for the past two decades. This country has wasted literally tens of Billions of $ on this scam that has done serious damage to the economy but has not done a smidgen of a dent on the "climate change" that most scientists know is primarily natural (despite what you may read in the paper or hear in many other places). Yes, you know it is a scam when these people 1) exaggerate or outright lie on what is really going on, 2) pocket millions of $ for themselves at everyone else's expense while producing nothing of substance, 3) use the issue to give themselves more power, 4) make exceptions for some of the worst offenders of their so-called problem, 5) ignore far more economical solutions to this so-called problem, and 6) try to shut down all speech that counters their agenda. And yes, I can honestly document all these assertions.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above