by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : May 15, 2014
CRITICAL READ WHAT: “Beyond Data Breaches: Global Interconnections of Cyber Risk,” a report from the Atlantic Council and global insurer Zurich. WHY: Cyber vulnerabilities can potentially “administer a shock” to the entire global economy, the authors wrote. They con- cluded that large, private-sector firms would be better first responders than government agencies in the event of a sys- temic cyberattack because agen- cies “lack agility and subject- matter expertise.” VERBATIM: “While our soci- ety’s reliance on the Inter- net grows exponentially, our control of it only grows linearly, limited by outdated government procedures and ineffective governance.... There is too much focus on risks at individual organiza- tions, and too little focus on the stability and resilience of the system as a whole. Gov- ernments and others with systemwide concerns...must devote far more attention to systemic rather than organi- zational risk.” FULL REPORT: AtlanticCouncil.org Risk Nexus Beyond data breaches: global interconnections of cyber risk April 2014 of global IT decision-makers say they have delayed or canceled cloud contracts because of surveillance concerns 16% May 15, 2014 FCW.COM 9 By the end of next year, the FBI’s Next Generation Identification system will contain as many as 52 million search- able facial images and offer new ways to link images to other data, according to documents made available by the agency in response to a Freedom of Information Act request. Details of how FBI’s NGI system will sift through databases were included in documents requested by the Electronic Frontier Foundation under FOIA. The organization has voiced concerns that NGI takes big-data capabilities too far by connecting palm print and iris rec- ognition capabilities to fingerprints, facial images and biographical informa- tion. NGI also links criminal and non- criminal databases for the first time. In an April 14 post on EFF’s website, Staff Attorney Jennifer Lynch said NGI builds on the FBI’s existing Integrated Automated Fingerprint Identification System, which already contains more than 100 million individual records. According to Lynch, NGI has been designed to include multiple forms of biometric data that are, in turn, linked to personal and biographical informa- tion such as name, home address, ID number, immigration status, age and race. In a Feb. 6 memo from the NGI pro- gram office to law enforcement agen- cies, FBI officials outlined some of the system’s data-crunching capabilities. A Universal Control Number will index and reference criminal and civil sub- jects by fingerprint-based identities. According to the memo, the UCN will also play a role in a new Identity His- tory Summary, which is essentially an electronic “rap sheet.” The summary “will provide com- plete identity history, in accordance with NGI business rules, to authorized users of the NGI system.” The FBI has projected that by 2015, the NGI database will contain 4.3 mil- lion images taken for non-criminal purposes. When commercial jobs require fingerprinting or background checks, the prints are sent to the FBI and stored in its civil print database. Before NGI, however, Lynch said the agency did not collect photographs along with those fingerprints. Furthermore, the FBI has not pre- viously linked its criminal and non- criminal databases. But with NGI, every record will have a UCN and every search will be run against all records in the database, she added. — Mark Rockwell Details emerge on scope of FBI’s identification system Join the conversation FCW uses Twitter to break news, field questions and ask our own. Learn more at Twitter.com/FCWnow. RT @usgsa: Dave McClure has done so much for federal IT. Thanks and best wishes. http://ow.ly/vUkld @drdavemcc @federalcloud via @fcwnow 2:35 PM - 17 Apr 2014 Sonny Hashmi @GSA_CIO Reply Retweet Favorite
April 30, 2014
May 30, 2014