[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Bush's DHS program continues under Obama
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Bush's DHS program continues under Obama
- From: Lee <ler762@xxxxxxxxx>
- Date: Sat, 4 Jul 2009 16:37:03 -0400
- Cc: or-talk@xxxxxxxx
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sat, 04 Jul 2009 16:37:05 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=AMgALsauCOmwpueD8h62wGCGa34hRKvk4qLuJjoqBco=; b=enX4EAh8lDDgQqdTg+VPiNNhhuRtv1WyZBd11clRrgUqpAnl7zzR5ezoLFiJB5wyuN amj0Q0j6ow7ZCIAZmtkX4tgZb756IFrkyYN3bfoxGrdfNaabHl26lZBtXtkr6G2zSrC6 KUsC1egB4jCbcu36CmlMxG8xjQbzLR2AnIgb4=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=I7uFYX+gIU/VJ8SGBsDLIHTJcuCj4xgDM5Zi/wYIEmAxelZKkDaDjIRmYHvaole/R8 YJ/cpQk3b9L8fdTsh1DFGPlRTE4iHPu8ca/zCJIvU2Np+eUZEsD7/GUG7l3levH5zpgx 2E2aICk7E0XE/ES3qFKAHh71YhsiBzE6BXkoI=
- In-reply-to: <200907040940.n649eJAn000366@xxxxxxxxxxxxx>
- References: <200907040940.n649eJAn000366@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Take another look at the article referenced:
"... the new program will scrutinize only data going to or from
government systems."
I can understand privacy concerns, but "Joe Stalin, eat your heart
out."??? get real.
from
http://www.whitehouse.gov/omb/legislative_testimony_evans_021408_safeguard/
Through the Trusted Internet Connections (TIC) initiative, we are
working with agencies to reduce the overall number of external Federal
connections, in order to manage our risk and secure our connections in
a more cost-effective and efficient manner to provide better awareness
of our environment. Agencies turned in plans of action and milestones
to fully optimize agency connections, with a target completion date of
June 2008.
As agencies optimize their external connections, security controls to
monitor threats must be deployed and correlated to create a
government-wide perspective of shared risks to our networks. The
Department of Homeland Security (DHS) supports an application named
Einstein to collect, analyze, and share aggregated computer security
information across the Federal government. Einstein will assist
agencies to raise their awareness and DHS for government-wide
awareness for information security threats and vulnerabilities. This
awareness will enable agencies and DHS to take corrective action in a
timely manner. We are currently working with DHS to build upon their
existing deployments and extend Einstein to all of the Federal
agencies.
Lee
On 7/4/09, Scott Bennett <bennett@xxxxxxxxxx> wrote:
>
> After the demise of the constitutional republic, the North American
> Surveillance State continues to grow ever nastier, complete with an
> unconscionable slur on the good name of Albert Einstein. See the article
> at
>
> http://www.washingtonpost.com/wp-dyn/content/article/2009/07/02/AR2009070202771_pf.html
>
> The need for tools like tor and PGP/GPG ought to become more and more
> apparent
> to Americans as time goes on. Meet the new boss: same as the old boss.
> Joe
> Stalin, eat your heart out.
>
>
> Scott Bennett, Comm. ASMELG, CFIAG
> **********************************************************************
> * Internet: bennett at cs.niu.edu *
> *--------------------------------------------------------------------*
> * "A well regulated and disciplined militia, is at all times a good *
> * objection to the introduction of that bane of all free governments *
> * -- a standing army." *
> * -- Gov. John Hancock, New York Journal, 28 January 1790 *
> **********************************************************************
>