Federal agencies are not obeying privacy laws regarding the datamining of personal information - and indeed most agencies do not understand the privacy implications of datamining activities, the General Accounting Office charged.
CBS Interactive's Distinguished Lecturer David Gewirtz hosts ZDNet Government -- ZDNet's politics and policy coffeehouse -- where civics lessons meet technology, nothing is sacred, and everything is fair game.
David Gewirtz, Distinguished Lecturer at CBS Interactive, is an author, U.S. policy advisor, and computer scientist. He is featured in the History Channel special The President's Book of Secrets and is a member of the National Press Club.
The FBI is no longer two technological steps behind cybercriminals. Agents are infiltrating IRC channels and watching the hackers, as they fight a pernicious foe: hackers who turn users' machines into zombies, shut down web servers and extort thousands of dollars.
Kids accused of actually using school-provided computers avoid felony charges, get community service. But is this good education policy to threaten experimentation with jail time?
21st century technology is giving police and homeland security officials more information than ever before. How do they filter it, process it, and act on it without infringing civil liberties?
The Central Florida Hurricane Center has an unofficial Google Map of the path of Hurricane Katrina across southern Florida. It's just one of hundreds of so-called "mashups" that combine data with software like Google Maps that uses open APIs.
What's a judge to do with bad drivers - really bad drivers? In Michigan, a judge is requiring that black box technology be installed on their cars, according to the Detroit News.
The FCC has granted a 30-day extension to VoIP providers to obtain acknowledgements from customers that they may have trouble reaching 911 via the Internet.
"Never before has a war been so immediately documented, never before have sentiments from the front scurried their way to the home front with such ease and precision."That's "milblogger" Chris Missick, a 24-year-old solider serving in Iraq, as profiled in John Hockenberry's article in Wired, "The Blogs of War."
Defense officials admitted that cyberattacks launched from Chinese computers have been targeting systems across the government. But it's still not clear who's doing the hacking.
The Automatic Network Outbreak Containment program identifies and quarantines worms that attack a network. Intel is also working on a way to pinpoint the location of a Wi-Fi user.