Apr
27

How China Uses its Cyber Power for Internal Security

From: The Diplomat

This is the first in a series of 5 articles discussing IT as a means to solidify Communist Party rule in the country.

By Greg Austin

On April 13, the China’s Communist Party (CCP) and State Council issued new guidelines on strengthening internal security in the wake of unprecedented terrorist attacks inside the country, rising public order concerns, and increasing online dissent. The guidelines called out the use of new high-technology and cyber-based assets, including data mining, closed circuit TV, and satellites, to help restore central government control. This is the first in a series of five brief items by Greg Austin, based on his 2014 book, Cyber Policy in China, providing some political context on how the country is using its cyber power in the service of internal security. See also the author’s earlier post on how China will want to use artificial intelligence to support its internal security objectives.

Apr
24

Pentagon to strengthen cybersecurity requirements in contracts

From: Washington Business Journal

Jill R. Aitoro

The Pentagon will incorporate new cybersecurity standards into all procurements for weapons systems as part of its new cyber strategy, unveiled Thursday.

According to the 42-page document, which details five overarching goals to improving the state of cybersecurity, the Department of Defense will “assess and initiate improvements to the cybersecurity of current and future weapons systems” on the basis of operational requirements.

Read Complete Article

Apr
21

Why Google Is the New Evil Empire

From: Fox Business

“We don’t need you to type at all because we know where you are. We know where you’ve been. We can more or less guess what you’re thinking about … Is that over the line?” – Google Chairman Eric Schmidt

A long time ago in a galaxy far, far away there was a Galactic Empire, a beady-eyed Emperor and his heavy-breathing sidekick, Darth Vader. Ever since, we’ve identified the corporate villains we love to hate. We had AT&T (T) in the 70s, IBM (IBM) in the 80s, and the evil empire of the 90s was of course Microsoft (MSFT)and Bill “The Conqueror” Gates.

Apr
20

The FBI’s Stance on Encrypted Communications

From: The Wall Street Journal

AMY HESS: Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so. Imagine a time when the police cannot pursue logical leads in electronic data to rescue a missing child, identify the co-conspirators of a massive fraud scheme, or obtain relevant evidence of an elected official’s public corruption. Imagine the injustice if a suspected criminal can hide incriminating communications without fear of discovery by the police, or if information that could exonerate an innocent party is inaccessible.

***

Apr
15

Joint Cyber Training New Nordic Priority

From: Defense News

By Gerard O’Dwyer

HELSINKI — Cyberwarfare technology training has been identified as a new project area within The military-run Nordic Defense Cooperation (NORDEFCO) program.

NORDEFCO will pool information gained from military-operated  cyber defense centers with research and intelligence received under partnership agreements with cyber crime law enforcement units.

Read Complete Article

Apr
14

The most concerning element of Facebook’s potential new power

From: Columbia Jounralism Review

By Trevor Timm

“Facebook has more power in determining who can speak and who can be heard around the globe than any Supreme Court justice, any king or any president.” Those prescient words came from law professor Jeffrey Rosen way back in 2010. Five years later, the Times is willingly handing its censorship keys over to that king of kings.

Apr
13

China’s Growing Cyberwar Capabilities

From: The Diplomat

A recent attack on GitHub highlights China’s growing expertise – and aggression – in cyberspace.

By Marcel A. Green

With recent news suggesting that the recent massive denial-of-service attacks against online hosting and code-sharing site GitHub was either sponsored or encouraged by Chinese authorities, the spotlight has once again been turned on China’s intentions in cyberspace and whether or not its activities pose a threat to worldwide, and especially U.S. cybersecurity.

Apr
10

‘Cyber security is a job for the government’

From: DW

The cyber attack on TV5 Monde shows the vulnerability of the digital workspace. The only cure: government intervention, says researcher Haya Shulman.

DW: Hackers attacked TV5 Monde last night, severely disrupting the channel’s broadcasts. Is that something that can be done from the outside?

Haya Shulman: Certainly, that can be done. Almost everything nowadays works over the Internet, over the IP network. This includes phone calls, television broadcasts, radio broadcasts. If you can exploit vulnerabilities in the Internet, then you could subvert a TV broadcast.

Are companies prepared? Do they try to secure their systems?

Apr
09

Diving into the Dark Web: Where does your stolen data go?

From: ZDNet

Summary:If your sensitive data is stolen online, where does it go — and who sees it? One security team found out.

By for Zero Day

When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

Target, Morgan Stanley, Sony, Anthem — the list of today’s major data breaches goes on. In the last few years alone, high-profile attacks have been launched against these companies and countless others, resulting in the theft of private communication, names, Social Security numbers, addresses, financial data and account credentials.

Apr
08

Government data is fuel for job creation, says Commerce Department CDO

From: Tech Republic

By

Ian J. Kalin, the first chief data officer (CDO) at the Commerce Department, is figuring out how to tie data products and science to a core mission of his agency: enhancing business and commerce.

The US has been collecting and publishing nautical data since the 19th century, providing navigators with better maps of the oceans that they sailed and then steamed across. Today, government agencies publish data about labor, energy, health, transit, telecommunications, criminal justice, and just about everything else than can be measured, managed, performed, or regulated by state entities.

Older posts «