The use of computers and the Internet in conducting warfare in cyberspace.
Cybersecurity and Cyberwarfare
FCC Rejects New York AG Efforts in Comment Quest
Federal Communications Commission General Counsel Thomas Johnson said the agency must “respectfully decline” requests from New York Attorney General Eric Schneiderman as part of the AG’s investigation into the fraudulent use of names on comments in the net neutrality rollback proceeding. Johnson said revealing the logs of IP addresses for some comments raises “significant personal privacy concerns” and could also endanger the security of the commission’s comment system.
Transatlantic Data Privacy
International flows of personal information are more significant than ever, but differences in transatlantic data privacy law imperil this data trade. The resulting policy debate has led the EU to set strict limits on transfers of personal data to any non-EU country—including the United States—that lacks sufficient privacy protections. Bridging the transatlantic data divide is therefore a matter of the greatest significance.
Trump White House Weighing Plans for Private Spies to Counter "Deep State" Enemies
Apparently, the Trump Administration is considering a set of proposals developed by Blackwater founder Erik Prince and a retired CIA officer — with assistance from Oliver North, a key figure in the Iran-Contra scandal — to provide CIA Director Mike Pompeo and the White House with a global, private spy network that would circumvent official U.S. intelligence agencies. The plans have been pitched to the White House as a means of countering “deep state” enemies in the intelligence community seeking to undermine Donald Trump’s presidency.
After several significant data breaches in recent years impacting hundreds of millions of Americans, malicious actors can now package consumer information from multiple stolen data sets into one stolen identity profile.The House Subcommittee on Oversight and Investigations will examine how to verify identities and protect personal data online compromised in this new, post-breach world.
Democratic Reps wants to commit $400 million to secure future elections from hackers
A panel of Democratic Reps wants to commit $400 million to secure future elections from hackers. That $400 million is what’s left over in appropriated funds from the 2002 Help America Vote Act, which focused on making voting easier for people with disabilities. The money could be used to replace outdated and unsecure voting machines that lack paper receipts for votes, the Democrats’ independent election security task force said in a Nov 20 letter to leaders of the House Appropriations Committee.
Data Manipulation: The dangerous data hack that you won’t even notice
[Commentary] A recent wave of cyberattacks—from WannaCry and Equifax to the alleged Russian influence on the US election—has demonstrated how hackers can wreak havoc on our largest institutions. But by focusing only on hackers’ efforts to extort money or mess with our political process, we may have been missing what is potentially an even scarier possibility: data manipulation. Imagine that a major Big Food company gets hacked.
Sen Leahy Introduces The Consumer Privacy Protection Act
Sen Patrick Leahy (D-VT), joined by six other Sens, introduced comprehensive consumer privacy legislation to protect Americans’ sensitive personal information against cyberattacks and to ensure timely notification and protection when data is breached. Sen Leahy’s Consumer Privacy Protection Act of 2017 would require companies to take preventive steps to defend against cyberattacks and data breaches, and to quickly provide consumers with notice and appropriate protection when a data breach occurs.
Witnesses:
- Ms. Jeanette Manfra, assistant secretary, Cybersecurity and Communications, National Protection and Programs Directorate, Department of Homeland Security
- Ms. Renee Wynn, chief information officer, NASA
- Ms. Essye Miller, deputy chief information officer for cybersecurity, Department of Defense
- Dr. Mark Jacobson, associate teaching professor, Edmund Walsh School of Foreign Service, Georgetown University
Society increasingly depends on computer networks and wireless systems. Yet, outages and adverse incidents are regular occurrences. It has become essential for this technology to maintain an acceptable level of service—in other words, to be resilient.
The purpose of this hearing is to explore ways the Department of Homeland Security can maximize the value of cyber threat information shared by the government and identify and utilize the most effective cyber threat information sharing partnerships, in order to increase the participation and volume of cyber threat information sharing with the private sector.