The use of computers and the Internet in conducting warfare in cyberspace.
Cybersecurity and Cyberwarfare
Federal Communications Commissioner Simington Calls For Robust US Cyber Trust Mark
The premise of the US Cyber Trust Mark is simple. As a device manufacturer, you certify that your device meets a list of cybersecurity criteria, such as that you use modern secure communications protocols and implement secure authentication, and in exchange, you get to put a flashy US Cyber Trust Mark logo on your packaging and sales materials, effectively an endorsement from the federal government of the security of your product.
Federal Communications Commission Launches First-Ever Enforcement Partnerships with State Attorneys General
Federal Communications Commission Chairwoman Jessica Rosenworcel announced a new initiative to strengthen and formalize the cooperation between the FCC and its state partners on privacy, data protection, and cybersecurity enforcement matters.
US stops helping Big Tech spot foreign meddling amid GOP legal threats
The US federal government has stopped warning some social networks about foreign disinformation campaigns on their platforms, reversing a years-long approach to preventing Russia and other actors from interfering in American politics less than a year before the US presidential elections. Meta no longer receives notifications of global influence campaigns from the Biden administration, halting a prolonged partnership between the federal government and the world’s largest social media company.
FCC Announces Tentative Agenda for December Open Meeting
Federal Communications Commission Chairwoman Jessica Rosenworcel announced that the items below are tentatively on the agenda for the December Open Commission Meeting scheduled for Wednesday, December 13, 2023:
Sen Cortez Masto Introduces Bills to Protect Americans' Data Online
Senator Catherine Cortez Masto (D-Nev.) reintroduced three bills to strengthen data privacy protections and safeguard Americans’ personal information. The U.S. currently has no comprehensive data privacy laws and with the rise of AI and other technologies, consumers are vulnerable to fraud, security breaches, and predatory behavior online.
Federal Communications Commission Adopts Rules to Protect Consumers' Cell Phone Accounts
The Federal Communications Commission adopted new rules to protect consumers against scams that aim to commandeer their cell phone accounts. The rules will help protect consumers from scammers who target data and personal information by covertly swapping SIM cards to a new device or porting phone numbers to a new carrier without ever gaining physical control of a consumer’s phone.
Rep. Luna (R-FL) Introduces Bill to Protect American Data from Foreign Adversaries
Rep. Anna Paulina Luna (R-FL) introduced the U.S. Data on U.S. Soil Act (H.R.6410) to protect the data security of Americans from being collected and exploited by our foreign adversaries. Specifically, the U.S. Data on U.S. Soil would protect the data security of the American people by:
Broadband Infrastructure Playbook 3.0
Playbook 3.0 combines four deep-dive modules that aim to help state broadband offices as they make decisions on key aspects of the Broadband Equity, Access, and Deployment (BEAD) program and complete their initial proposals for NTIA review before a December 27 deadline. The Broadband Infrastructure Playbook 3.0 includes the following modules that offer solutions to some of the most challenging BEAD proposal requirements:
Rep Hinson Introduces the Defend Our Networks Act
Due to their close ties to the Chinese government, Huawei and ZTE equipment presents significant risks to U.S. national security and domestic communications networks. The Federal Communications Commission (FCC) has already prohibited the purchase of Huawei and ZTE products and banned the use of FCC funds to expand or maintain networks containing any Huawei or ZTE equipment, and ordered telecommunications carriers to tear out equipment made by Huawei and ZTE. However, this equipment is still embedded throughout U.S. networks.
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure
The information collected by, and stored within, mobile networks can represent one of the most current and comprehensive dossiers of our life. Our mobile phones are connected to these networks and reveal our behaviours, demographic details, social communities, shopping habits, sleeping patterns, and where we live and work, as well as provide a view into our travel history. This information, in aggregate, is jeopardized, however, by technical vulnerabilities in mobile communications networks.