"This is a drop in the bucket, " says Paul Henry, a spokesman for information technology security firm Secure Computing.
In addition, I believe several changes are urgently needed in the way U.S. and Western technology security is being handled.
Worse yet, members of these committees may actually aggravate the present situation and, in the process, further weaken U.S. technology security.
What is urgently needed is a strong NSC office responsible for coordinating and overseeing international economic, financial and technology security affairs.
It remains to be seen whether these Committees will again choose to get involved in technology security issues in the 101st Congress.
CENTERFORSECURITYPOLICY: US-Soviet Joint Ventures: The Camel's Nose Under The Tent
These questions -- and the serious problems they illuminate about Germany's technology security policies -- require urgent consideration by the United States government.
Finally, I believe the Committee must look into the whole manner in which the executive branch is staffing and acting upon technology security issues.
At a minimum, doing so will alert them to the risks that attend some of the policy choices affecting the economic, financial and technology security portfolio.
CENTERFORSECURITYPOLICY: The Felix Bloch Affair: Assessing The Damage To US Security
In early October, Ambassador Alan Wendt of the State Department and the director of the Defense Technology Security Agency, William Rudman, made an important tour of European capitals.
Over the years, there has been a clear erosion in the congress, especially on the House side, in the balance stuck between necessary technology security and legitimate trade.
CENTERFORSECURITYPOLICY: US-Soviet Joint Ventures: The Camel's Nose Under The Tent
For example, would discussions take place there concerning future sales of technology for which export licenses had not yet been improved -- risking serious breaches in technology security?
CENTERFORSECURITYPOLICY: Center For Security Policy Applauds State Department
"I wouldn't turn off your spam filter, " says Paul Henry, a spokesman for the information technology security firm Secure Computing (nasdaq: SCUR - news - people ).
President Bush, like Ronald Reagan before him, should call for a ministerial meeting involving all COCOM nations to review the current state and future direction of Western technology security policy.
The Center for Security Policy believes that the blatant contradictions and misrepresentations riddling this chronology beg a number of serious questions about German technology security policies past, present and future.
The German government contends that recently revealed illegal transfers from German companies to Iraq were able to occur as a result of "insufficient staff" resources in its technology security apparatus.
Indeed, the NSC has shown irresponsible disinterest in the whole matter of technology security, enormously compounding the risks of capricious decontrol actions -- and increasing the likelihood that they will occur.
In fact, many U.S. allies have been restive under this policy since it was adopted in the early 1980s, at a time when the United States government began to strengthen technology security measures both at home and abroad.
Under no circumstances should the United States assent to German demands for further liberalization of the multilateral export control regime unless and until Bonn can demonstrate the adoption of a far more conscientious technology security policy and effective enforcement of existing arrangements.
Gertz quotes John Shaw, the Deputy Under Secretary of Defense for International Technology Security, who contends - based on information from two reliable European intelligence services - that Russian troops and Iraqi intelligence "almost certainly" removed the missing material from the facility.
While the foregoing litany illustrates the mindset of many in the Bush Administration on the irrelevance of a rigorous technology security policy in the so-called post-Cold War world, the specific device being used to force reckless decontrol actions through the U.S. government warrants special mention.
The Transportation Security Administration cannot discuss specific detection capabilities of its technology for security reasons, said TSA spokesman Greg Soule.
Talks focused on four broad areas -- sharing information between countries, passenger vetting, security technology and creating international aviation security standards, she said.
Security features include TPM1.2 data security technology, BIOS built-in security, and a Kensington lock connector.
ENGADGET: GammaTech rugged T7Q launches at $2k and up, promptly steals your iPad's lunch money
But even before the terrorism in Boston, the benefits of applying technology to security altered the trade-off with privacy expectations.
"Advanced imaging technology enhances security by safely screening passengers for metallic and non-metallic threats including weapons, explosives and other objects concealed under layers of clothing without physical contact, " Soule said.
Last month in London, Samsung hosted the first meeting of a new government-advisory board, made up of Samsung executives and technology-security experts from Western government agencies, including the U.S. National Security Agency.
E-mails leaked in 2010 described how a group of technology and security firms cooked up a plan to spy on and feed disinformation to Chamber Watch and discussed it with the Chamber's law firm.
Smith discussed the contribution being made by the Casey Institute to the national debate on issues in the nexus between national security as traditionally understood and the emerging fields of financial, economic, technology and energy security.
CENTERFORSECURITYPOLICY: 'Global warning' about global climate change treaty
If a client instructs an attorney not to use certain technology due to the security concerns expressed in this piece, then such technology should not be used in the course of representing that client.
FORBES: Your Ethical And Legal Duties When Using Wireless Networks
Russell Dietz is vice president and chief technology officer at SafeNet, a global leader in information security, and has more than 25 years of technology experience in the data management, security, embedded and distributed systems industries.
FORBES: Securing Data in the Cloud? Call in the Magnificent Seven
应用推荐