May 9, 1991 |
As the Bush Administration seeks to improve the federal government's none-too-stellar record on safeguarding the environment, it is running into an unexpected stumbling block in one area: its efforts to force the federal bureaucracy to recycle the 50,000 tons of memos, reports, plans and directives that it spews out every year. The security-minded are resisting it.
June 12, 2010 |
As the government begins deploying whole-body imaging machines to replace metal detectors at airports nationwide, some security experts worry that the new technology could make it easier, not harder, to sneak weapons and explosives onto airplanes. In the wake of the attempted Christmas Day airline bombing, the Transportation Security Administration decided to double its investment in the new machines, with a goal of installing 450 across the country by the end of the year and 1,800 by 2014.
CALIFORNIA | LOCAL
November 4, 2013 |
When Congress formed the Transportation Security Administration two months after 9/11, the agency's mission was clear: Its officers would not carry guns or make arrests. Instead, they would focus on screening passengers for weapons, bombs and other dangerous materials. But the shooting death of a TSA officer at Los Angeles International Airport - the first fatality in the agency's history - could change that. On Monday, the union representing 45,000 federal security agents called for the creation of a class of armed TSA officers with law enforcement training and the authority to arrest people.
February 12, 2014 |
WASHINGTON - The White House has released guidelines aimed at prodding companies that run some of the nation's most essential services such as utilities, cellphone towers and banks to better protect themselves from cyberattacks. Officials said the guidelines, developed under an executive order that President Obama signed a year ago, provide companies overseeing the nation's crucial infrastructure with a blueprint for identifying potential threats, protecting themselves from cyberattacks and, if an attack occurs, recovering from it. But the voluntary nature of the guidelines showed how sharply proponents of strong regulation have scaled back their ambitions - and even their language - in the face of industry opposition to government intervention.
July 25, 2013 |
At least 2 million people received the email May 16 notifying them that an order they had just made on "Wallmart's" website was being processed, though none of them had done any such thing. Still, thousands of people clicked on the link in the email, taking many of them to a harmless Google search results page for "Walmart. " Others weren't so fortunate. The link led to the invisible download of malware that covertly infected their personal computers, turning them into remotely controlled robots for hackers, according to email security firm Proofpoint Inc. These sorts of "phishing" attacks are not only becoming more common but also are getting more lethal, with fake emails becoming harder to distinguish from real ones.
January 31, 2013 |
More than 30 journalists and executives at western news organizations in China, including the New York Times, have had their computers hacked, according to Mandiant, a security firm that monitors such attacks. Over the last four months, the hackers managed to infiltrate the Times' computers, the newspaper reported Thursday. In a lengthy piece, the newspaper said the hackers had penetrated its computers and obtained passwords for reporters and other employees. The hackers have been blocked and security tightened to prevent another attack, which followed an investigation by the paper into finances of relatives of Wen Jiabao, China's premier.