{"id":377,"date":"2014-11-26T01:56:24","date_gmt":"2014-11-26T01:56:24","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2014\/11\/26\/dhs-set-to-destroy-governmentwide-network\/"},"modified":"2023-07-28T16:25:49","modified_gmt":"2023-07-28T20:25:49","slug":"dhs-set-to-destroy-governmentwide-network","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2014\/11\/26\/dhs-set-to-destroy-governmentwide-network\/","title":{"rendered":"DHS Set to Destroy Governmentwide Network Surveillance Records &#8211; Nextgov.com"},"content":{"rendered":"<blockquote>\n<p><em>Categories of Records Headed to the Trash Folder<\/em><\/p>\n<p>Core Infrastructure &ndash; Email, contact and other personal information of federal workers and public citizens who communicate concerns about potential cyber threats to DHS; &ldquo;Suspicious files, spam and other potential cyber threats via an email network&rdquo; exclusively used within DHS&rsquo; Mission Operating Environment system.<\/p>\n<p>Intrusion Detection &ndash; Network traffic data and alerts from government servers; this information includes the IP address, port address, timestamp and some red flags identified in network traffic; telltale signs, or signatures, of known malicious behavior; oddities in captured traffic, such as &ldquo;an unusual number of hits,&rdquo; or sometimes, &ldquo;known actors floating through multiple dot-gov&rdquo; websites. Interactions with domain name system servers that translate website names like \u201cUSDA.gov\u201d into numeric IP addresses.<\/p>\n<p>Intrusion Prevention &ndash; Indicators of known and unknown malicious activity agencies should be on the lookout for.<\/p>\n<p>Analysis &ndash; Forensic imagery and files from the U.S. Computer Emergency Readiness Team containing malicious data for studying purposes; metadata from traffic &ldquo;packet capture&rdquo; analysis might contain email addresses and IP addresses; a database for supporting commercially available tools that allow US-CERT personnel to visualize relevant relationships &ldquo;by presenting drilldown views of data with patterns, trends, series and associations to analyze seemingly unrelated data\u201d; a segregated, closed computer network system for inspecting digital devices and their storage mediums; information about security vulnerabilities and threats in the form of actual malicious code submitted to US-CERT.<\/p>\n<p>Information Sharing &ndash; Technical Web records, including operations and maintenance; content might include research, white papers, advertising for conferences and other published information for feds and the public; \u201cCyberScope&rdquo; reports on an agency&rsquo;s security posture required to comply with the 2002 Federal Information Security Management Act; the US-CERT.gov website and data exchange portal; a repository for threat sightings and indicators.<\/p>\n<\/blockquote>\n<p><a href='http:\/\/www.nextgov.com\/cybersecurity\/2014\/11\/dhs-set-destroy-governmentwide-network-surveillance-records\/99737\/'>DHS Set to Destroy Governmentwide Network Surveillance Records &#8211; Nextgov.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Categories of Records Headed to the Trash Folder Core Infrastructure &ndash; Email, contact and other personal information of federal workers and public citizens who communicate concerns about potential cyber threats to DHS; &ldquo;Suspicious files, spam and other potential cyber threats &hellip; <a href=\"https:\/\/melange.dmaculate.me\/home\/2014\/11\/26\/dhs-set-to-destroy-governmentwide-network\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-377","post","type-post","status-publish","format-link","hentry","category-uncategorized","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1665,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/05\/28\/european-commission-wants-to-immunize-dhs\/","url_meta":{"origin":377,"position":0},"title":"European Commission wants to immunize DHS collaborators in travel surveillance and control","author":"aslam","date":"May 28, 2011","format":false,"excerpt":"news-intercom: No p-laws apply to #PNR held by #DHS. Travel data mining to be immunized by #EU http:\/\/bit.ly\/j2zdpE","rel":"","context":"In \"data mining\"","block_context":{"text":"data mining","link":"https:\/\/melange.dmaculate.me\/home\/tag\/data-mining\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1082,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/02\/29\/dhs-monitoring-of-social-media-under-scrutiny-by\/","url_meta":{"origin":377,"position":1},"title":"DHS Monitoring Of Social Media Under Scrutiny By Lawmakers","author":"aslam","date":"February 29, 2012","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesWASHINGTON \u2013 Lawmakers looking into homeland security officials\u2019 practice of monitoring social media sites seized on a report Thursday by a civil liberties group that said taxpayers have shelled out more than $11 million to a private contractor to analyze online comments that \u201creflect adversely\u201d\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":879,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/08\/23\/drugs-guns-and-child-porn-at-homeland-security\/","url_meta":{"origin":377,"position":2},"title":"Drugs, guns and child porn at Homeland Security","author":"aslam","date":"August 23, 2012","format":"link","excerpt":"Drugs, guns and child porn at Homeland Security","rel":"","context":"In \"dhs\"","block_context":{"text":"dhs","link":"https:\/\/melange.dmaculate.me\/home\/tag\/dhs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1429,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/09\/30\/forced-by-a-private-company-to-wear-an-ankle\/","url_meta":{"origin":377,"position":3},"title":"Forced by a Private Company to Wear an Ankle Monitor? The Truth About Obama&#8217;s Latest Immigration Reform | Immigration | AlterNet","author":"aslam","date":"September 30, 2011","format":false,"excerpt":"Via Scoop.it - Rights & Liberties An immigration activist explains his hopeful reaction to new legislation \u2013 until he ended up shackled by a company with a lucrative DHS contract. \u00a0Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1881,"url":"https:\/\/melange.dmaculate.me\/home\/2019\/06\/08\/facial-recognition-deployed-at-major-us-airports-without-public-comment-or-checks-and-balances-but-us-citizens-can-opt-out\/","url_meta":{"origin":377,"position":4},"title":"Facial recognition deployed at major US airports without public comment or checks and balances, but US citizens can opt out.","author":"aslam","date":"June 8, 2019","format":false,"excerpt":"In the absence of laws or legal precedents addressing the constitutionality of its use, U.S. Customs and Border Patrol has deployed facial recognition technology at at least 17 airports. Airlines and governments of other countries are doing this as well, in a vacuum of international regulations to protect travelers' privacy\u2026","rel":"","context":"In \"CBP\"","block_context":{"text":"CBP","link":"https:\/\/melange.dmaculate.me\/home\/tag\/cbp\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":180,"url":"https:\/\/melange.dmaculate.me\/home\/2016\/01\/29\/if-you-are-a-muslim-immigrant-seeking-us\/","url_meta":{"origin":377,"position":5},"title":"If you are a Muslim immigrant seeking US citizenship, the FBI is the Stasi.","author":"aslam","date":"January 29, 2016","format":"link","excerpt":"This is just one example. A software programmer who went to college in the US happens to be a Muslim Immigrant from Pakistan. He applies for a green card. The FBI gets hold of the application and holds it hostage, asking him to provide names of people he thinks are\u2026","rel":"","context":"In \"FBI\"","block_context":{"text":"FBI","link":"https:\/\/melange.dmaculate.me\/home\/tag\/fbi\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=377"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/377\/revisions"}],"predecessor-version":[{"id":2370,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/377\/revisions\/2370"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}