Category Archives: Internet Security
Partnerships, Cooperation Key to Long-Term Gov Tech Success – Government Technology
State and local government technology leaders are facing strong headwinds. Ransomware and cyberattacks are commonplace. Technology officials responsible for election security are under constant pressure and scrutiny. And the new COVID-19 virus has further complicated the already action-packed agendas of CIOs and IT management. Most technology departments are short of staff, funding and time.
How can we cope with these issues? Its important to remember that we cant and shouldnt go it alone. 2020 presents a golden opportunity to connect or reconnect with our peers, residents and colleagues across the technology spectrum. We often overlook talent and resources in our backyard as well as around the country. We get so busy in daily operations that we may miss tangible ways to strengthen our teams resiliency. Lets look at some ideas to boost your capacity to undertake the current threats and challenges.
We have friends and significant resources at the federal level. The Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency offers substantial training, tools and support for state and local agencies. The Center for Internet Security and the Multi-State Information Sharing and Analysis Center are outstanding organizations willing to help. Additionally, the United States Digital Service, 18F and the Defense Digital Service at the Department of Defense are doing amazing and inspiring work for all of us to model after.
State CIOs, CTOs and CISOs are increasingly interested in forging new partnerships. There are examples of regional and statewide cooperative groups to tackle cybersecurity, digital inclusion and procurement, and National Guards are quickly becoming cyber first responders in many states. The National Governors Association launched a Resource Center for State Cybersecurity, and weve seen innovation from states like Michigan in building a cybersecurity version of the Medical Reserve Corps. The Michigan Cyber Civilian Corps is a group of trained civilian experts who stand ready as a rapid response team.
Were likely to see new examples of mutual aid agreements, not for fighting fires or criminals, but for cybersecurity. The public safety versions of these agreements have been in place for decades, and most agencies are ill-equipped to deal with the new reality of cyberdisasters. IT staff from neighboring jurisdictions could help stem the digital avalanche. Mutual aid agreements typically stand the test of time regardless of the turnover of elected officials, city/county managers or IT staff.
One of the most significant rewards of working in the public sector is the ability for us to share information and best practices with colleagues playing for other teams, as were generally not in competition. Denvers Peak Academy has improved operations not only in that city, but their staff has also evangelized the techniques and best practices to other government agencies throughout the country. Everyone is better off for their efforts. The private sector doesnt typically provide these sharing opportunities.
Residents and citizens are frequently untapped resources. There are experts on data, user-centered design, cybersecurity and many other areas who can collaborate with us. These volunteers are generous with their time and help us stay grounded to our constituency. Plus, nearby universities and colleges offer students seeking internships and work-study opportunities. The students gain valuable experience, make a lasting impact and add new ways of thinking.
Associations also offer outstanding opportunities to learn and grow, but perhaps, most importantly, the chance to commiserate about our shared battles and predicaments. Its like gov-therapy: good for the brain and the soul. Excellent examples include Engaging Local Government Leaders, Government Management Information Sciences and the National Association of Government Web Professionals.
Government IT leadership can be lonely and daunting at times. Still, we can survive and even thrive with innovative partnerships, collaboration and looking beyond our boundaries for assistance.
View post:
Partnerships, Cooperation Key to Long-Term Gov Tech Success - Government Technology
Employment Security working to expand capacity due to to surge in COVID-19 Unemployment Claims – Taylorsville Times
The North Carolina Division of Employment Security is taking immediate actions to help people who are unable to work because of COVID-19, according to an April 3rd press release.Approximately 370,000 North Carolinians have filed for unemployment insurance assistance since March 16, an unprecedented spike in filings as a result of the pandemic. Prior to COVID-19, DES received about 3,000 claims a week.
As of April 3, DES has sent out more than $10 million in unemployment benefits for claims related to COVID-19. That number will grow exponentially in the coming days. Claimants should be aware that it takes approximately 14 days from the time a person files a claim to receive their first payment.
DES is committed to intaking and processing every claim from workers impacted by COVID-19 in a timely and efficient manner, despite the extraordinary surge in demand. Accordingly, DES is moving aggressively to build the capacity necessary to help North Carolinians quickly get their benefits.
To better assist individuals and employers, initial steps include: Hiring 50 new staff Adding 100 staff from Division of Workforce Solutions Career Centers Contracting with an additional 200-person call center Adding computer servers to ensure capacity for large number of people filing online Doubling printing and mail capacity to ensure timely delivery of documents Purchasing more than 500 new computers and other equipment so employees in the office and at home can work to process claims.
Following these initial steps, the division will have more than 850 people working to process unemployment claims and get payments out the door.
The Division of Employment Security understands that for people who have lost their jobs, the assistance cant get there soon enough, said Lockhart Taylor, assistant secretary for DES. We are taking immediate action to increase our capacity in the face of this historic challenge and be there for the North Carolinians who need our help.
On Saturday, March 28, Governor Roy Cooper authorized DES to implement three federal unemployment programs. The first provides an additional $600 in weekly benefits. The second provides up to 13 additional weeks of benefits. The third is Pandemic Unemployment Assistance, which is assistance for people who are not typically eligible for state unemployment benefits. This should provide coverage to self-employed workers or independent contractors. DES needs final guidance from the U.S. Department of Labor in order to make the federal assistance available.
Individuals can file for unemployment benefits online at des.nc.gov. Those who have internet access are encouraged to check the website for updates and answers to their questions before calling the customer call center. People without internet access should call 888-737-0259 for assistance.
The most up-to-date information about eligibility and how to apply for benefits can be found on the Division of Employment Security website at des.nc.gov.
See more here:
Employment Security working to expand capacity due to to surge in COVID-19 Unemployment Claims - Taylorsville Times
Work from home: Securing RDP and remote access – We Live Security
As work from home is the new norm in the coronavirus era, youre probably thinking of enabling remote desktop connections for your off-site staff. Heres how to do it securely.
Accessing your servers or workstations desktops remotely is a great way to manage them. Its also a huge target for hackers.
For example, if hackers can gain access to the administrator login to your Domain Controller, they effectively own your Windows infrastructure and can quickly wreak havoc on your organization. From sending corporate emails to accounting departments and bookeepers, to siphoning off your companys intellectual property, to encrypting all your companys files and holding them for ransom, hacks on Remote Desktop Protocol (RDP) can be very bad.
In this context, although we will mainly say RDP, we mean all kinds of remote desktop and remote access software, including VNC, PC Anywhere, TeamViewer and so forth, not just Microsofts RDP. The good news is there are many defenses against RDP attacks, starting with turning it off. If you dont really need remote access, the off switch is the simplest.
If you do need to allow such access, there are a variety of ways to restrict it to the good guys:
First off, allow access only from internal IP addresses coming from your companys VPN server. This has the added benefit of not exposing RDP connection ports to the public internet.
Speaking of exposing ports, if thats your only choice, you may want to serve up RDP on a non-standard port number to avoid simplistic worms from attacking your network through its RDP ports. Keep in mind, though, that most network scanners check all ports for RDP activity, so this should be viewed as security through obscurity, since it provides practically no additional security against modestly sophisticated attackers. You will have to be extremely vigilant about reviewing network access and login activities in your RDP server logs, as it may be more a matter of when and not if an attacker accesses your network.
RELATED READING: COVID19 and the shift to remote work
Second, make sure to enable Multi-Factor Authentication (MFA) for remote users as another authentication layer, which we discussed in Work from home: Improve your security with MFA.
Third, whenever possible, only allow incoming RDP connections from your users public IP addresses. The easiest way for remote employees to look up their public IP address is to search Google for What is my IP address and the first result will be their IP address. Then your remote workers can provide that information to your IT/Security staff so that your company or organization can build a whitelist of allowed IP addresses. It is also possible to build a whitelist of allowable IPs by allowing their subnet, since dynamic home IP addresses would normally still fall within a subnet after a router reboot or other network maintenance on the client end.
Even if you secure your RDP access, there has recently been a flurry of exploits against it, so to avoid issues, make sure its fully patched. More information on securing RDP can be found in Its time to disconnect RDP from the internet.
Read the rest here:
Work from home: Securing RDP and remote access - We Live Security
Russian Security Hacking the ‘Internet of Things’ – Byline Times
Stephen Komarnyckyj reports on documents revealed by Russian hackers that claim that their countrys security service has commissioned a programme which exploits smart appliances.
Russias security service, the FSB, have commissioned a programme which uses the Internet of Things (IoT) for espionage, according to a hacking group Digital Revolution. The group published what they claim are images of the documentation for the project on 18 March 2020.
The programme known as Fronton accesses devices linked to the web through the Internet of Things. Any smart appliance ranging from a washing machine to a camera in a shopping mall is potentially vulnerable. The programme uses these devices to attack web services. Social media sites could be blocked or the internet services of a small country could be paralysed swiftly.
The hackers have released images of code snippets which show that the programme was being developed as long ago as 2017 to 2018. There is also a technical specification for the programme purportedly issued by military unit No 64829, which is the FSBs information security centre.
The specification was purportedly used to commission the development of the programme from the Russian firm InformInvestGrupp. According to its website, the company, which was established in 1998, is licensed by the FSB to carry out confidential government projects.
The Moscow based firm Oday is also allegedly involved in developing the cyberweaponry, according to the documents. Oday has previously worked with Russias interior ministry on programmes for collecting information on internet users. Its CEO, Ruslan Gilyazov, is an IT specialist who also heads an IT security laboratory at Moscows Lomonosov University where he often recruits staff for the firm. He specialises in the mathematics of internet security and would have the skills necessary to develop some elements of the programme.
Digital Revolution claimed to have hacked Odays servers in April 2019 but the company refused to confirm or deny this allegation. However, the quantity of documents published then, the wealth of information they contained and the level of detail makes it hard to believe that they were forged.
The Internet of Things is particularly vulnerable to CyberAttack. Many users simply unpack their products and use them without modifying the default passwords installed by the manufacturer making them vulnerable to hackers.
The FSB was partly inspired to develop the programme after witnessing the 2016 success of a malicious programme called Mirai. Mirai targeted consumer goods such as cameras linked to the Internet of Things. On 21 October 2016, the programme was used to attack Dyn, a web service provider, resulting in dozens of sites being blocked in some areas of North America and Europe. The sites affected included The New York Times, Twitter and amazon.com.
Fronton would draw mainly on video cameras and recorders because they have a sufficient communication channel to launch attacks. A special search server would be used to spot devices that could be targeted. The server would use the TOR browser a free software which hides a web users identity so that tracing the source of any attack is almost impossible.
The documents published by Digital Revolution raise serious concerns over the security of any gadget linked to the web and the new arms race for supremacy in the cyber world.
See the original post:
Russian Security Hacking the 'Internet of Things' - Byline Times
Unpacking TikTok, Mobile Apps and National Security Risks – Lawfare
On March 12, Sen. Josh Hawley introduced a bill into the Senate to ban the downloading and use of TikTok, the Chinese social media app, on federal government devices. Hawleys bill carves out exceptions for such activities as law enforcement investigations and intelligence collection, but holds that
no employee of the United States, officer of the United States, Member of Congress, congressional employee, or officer or employee of a government corporation may download or use TikTok or any successor application developed by ByteDance or any entity owned by ByteDance on any device issued by the United States or a government corporation.
Currently, the Transportation Security Administration and the U.S. Army have also banned the app on employee phones.
But whats Hawleys objection to an app used widely for dance challenges and lip-syncing?
The narrative goes something like this: TikTok is a company incorporated within China; the Chinese government pervasively surveils within its borders and can get access to company-held data on a whim; thus, TikToks potential collection of information on U.S. citizens is a security risk. Yet also thrown into the discussion are other allegationsTikTok removes political content at Beijings behest, for example. The failure to decouple these risks only muddies the waters and makes it harder for policymakers and the general public to understand the threats at play.
In reality, TikTok carries five clear risks. Two pertain directly to national security, and three perhaps relate to it, though not as clearly. All have been conflated or blurred together, at one point or another, by pundits and others commenting on TikToks risks. Policymakers and analysts would be wise to make meaningful distinctions among these risks and provide more nuance and detail around each specific threat.
Policymakers may clearly have many different interpretations of each of these risks likelihood and severity. Theres also no clear answer on what policymakers should do about the app. And, in reality, the problems raised by TikTok are much bigger than the app itselfrepresentative of larger questions that must be answered around U.S. data security policy.
Risk 1: TikTok Collecting Data on U.S. Government Employees
The first risk posed by TikTok is the collection of data on U.S. government employees (including those working as contractors). These are people who either have security clearances or could have clearances in the future or at the very least perform tasks that, if not classified, may still be considered sensitive in an unofficial sense. Data collection on these individuals and their activities can therefore reveal important national security information or be used in a coercive manner (that is, blackmail) to target those individuals.
There are two considerations with this type of data collection risk: the kinds of data that are being or might be collected; and Beijings ability to access that data.
The data collected by TikTok, at least on the surface, might seem relatively benign; after all, the app is a social media platform for sharing videos. Even if a U.S. federal government employee has the app, one could argue, that doesnt mean theyre sharing any videos that somehow compromise their personal or professional activities. And they can use the app without jeopardizing sensitive information.
But where the risk gets more complicated is the reality that most phone apps collect far more information than what the average user would suspect they are handing over to the app. (This might even go beyond that single firm: Charlie Warzel at the New York Times, for example, has a great explanation of how just by downloading an app, youre potentially exposing sensitive data to dozens of technology companies, ad networks, data brokers and aggregators.)
TikTok is reasonably upfront about the high volume of data it collects: its privacy policy for U.S. residents states,
We automatically collect certain information from you when you use the Platform, including internet or other network activity information such as your IP address, geolocation-related data (as described below), unique device identifiers, browsing and search history (including content you have viewed in the Platform), and Cookies (as defined below).
It notes further that [w]e also collect information you share with us from third-party social network providers, and technical and behavioral information about your use of the Platform, such as, potentially, contact lists on other social media services. This type of data collection can especially implicate national securitygeolocations or internet search histories of federal employees can reveal quite sensitive information, such as the location of secret government facilities, details about events relevant to the government about which those employees are seeking publicly available information, and personal activities that could potentially be used to build files for blackmail.
TikTok is hardly alone in this kind of collectiongo read the privacy policy of most major social media platforms and youll find similar if not more encompassing language.
But TikTok has a unique challenge: There are real questions about who beyond TikTok might have access to the collected data. This risk likely exists whether the app is downloaded on a government-owned device used by an employee, or on a personal device used by the employee.
So can the Chinese government compel the company to turn over data?
As Samm Sacks recently wrote, Nothing is black and white, particularly when it comes to government access to data. Ultimately the Chinese government can compel companies to turn over their data, but this does not always happen. In some cases, companies can and do push back against government requests, as they have their own commercial interests to protect. There are real risks of government access to data, and this does happen, but its not as clear-cut in practice as many might assume.
There are also real fears among some U.S. policymakers that data from a company like TikTok could be added into an enormous dataset Beijing continues to compile from incidents such as the Equifax breach and the hack of the Office of Personnel Management. The product of such data-hoarding, in this view, is a massive dossier on U.S. persons that the Chinese government can use for intelligence and security purposesconsisting of everything from communications to credit scores to travel histories.
It is clear that there are national security risks with TikToks collection of data on U.S. federal government employees. The question for policymakers comes down to ones perceived likelihood of the risk, the severity of the risk and what to do about it.
Risk 2: TikTok Collecting Data on U.S. Persons Not Employed by the Government
Second is the risk that TikTok collects data on U.S. persons not working for the federal government in ways that still potentially impact national security. The considerations here mirror those of TikToks data collection on federal employees.
Yes, the link between data collection on federal personnel and national security threats (that is, counterintelligence operations) is clearer. One could imagine how a clearance-holding federal employee with an embarrassing internet search history could be blackmailed, or how the GPS movements of a clearance-holding federal employee would likewise be valuable to a foreign intelligence service.
Here, one danger is merely the potential for U.S. persons not currently employed by the government to have clearances or perform other sensitive government tasks in the future. There could also be the potential for collection to target individuals in the private sector working on proprietary and national security-related technologies.
The collection of this data could therefore have potential impacts on U.S. national security in ways that may give policymakers reason to consider wider action against TikTok. Policymakers decisions to take wider action would depend on where and how they interpret specific risk cases. For instance, one could perceive a risk of higher severity for an engineer working on tightly held and cutting-edge satellite imaging technology than for your average person.
It is also possible, in a Cambridge Analytica-style fashion, that such information could be used to develop profiles on Americans in ways that lend themselves to enhanced microtargeting on social media and other platforms.
In terms of the kinds of data being collected, TikTok, like most social media companies, very likely just collects the same types of information on all of its users. So collection on federal employees is likely the same as for non-federal employees.
The same goes for the legal authorities governing Beijings access to TikTok data: The risk remains largely similar to the risk for federal employees. Maybe Beijing has greater incentive to request access to certain kinds of information when data is on U.S. government employees than when its not. That said, this may also not be the case. TikTok might collect information from private citizens that exposes security-sensitive corporate activities. And what about the microtargetingcould Beijing have an incentive to access the data if it lent itself to, say, pushing advertisements for Chinese Communist Party (CCP)-preferred candidates in a U.S. election?
Risk 3: TikTok Censoring Information in China at Beijings Behest
The third risk pertains to Beijing ordering, forcing, coercing or otherwise leading TikTok to remove information on the platform in China. (This could include TikTok preemptively self-censoring content out of concern over possible retribution from the Chinese government.) This is not directly a U.S. national security issue, but it merits attention because of the way it has been roped into conversations about TikToks risks.
The Washington Post reported last fall, for example, on the ways in which certain content that the CCP dislikessuch as information on the Hong Kong pro-democracy protestswas strangely absent from TikTok.
Subsequently, amid this and other reports in the media about alleged TikTok censorship, Sens. Chuck Schumer and Tom Cotton sent a letter to the acting director of national intelligence, stating that
TikTok reportedly censors materials deemed politically sensitive to the Chinese Communist Party, including content related to the recent Hong Kong protests, as well as references to Tiananmen Square, Tibetan and Taiwanese independence, and the treatment of Uighurs. The platform is also a potential target of foreign influence campaigns like those carried out during the 2016 election on U.S.-based social media platforms.
In addition to raising concerns about the aforementioned risks of data collection on U.S. persons, the senators requested the intelligence community to investigate allegations that TikTok engages in political censorship at the direction of the Chinese government.
But many of the conversations about this political censorship do not distinguish between TikTok removing content within Chinas borders and TikTok removing that same content globally. This might seem like a trivial distinction, but its not. In the former case, content would be removed (or perhaps algorithmically downplayed) for those accessing the mobile application from within Chinas geographic borders. Thus, this geoblocking would affect those physically located within China. If TikTok was censoring content globally, by contrast, once flagged, the offending content would be deleted from anyones and everyones TikTok feed.
The former issue of geoblocked content within China (that is, this third risk) is mostly a domestic issue in China. It is an issue of free speech and human rights, certainly, but it doesnt directly impact U.S. national security in the ways that it potentially would if content was removed globally at one governments behest.
Risk 4: TikTok Censoring Information Beyond China at Beijings Behest
So what is the national security risk if TikTok did not limit its content takedowns to within China?
There is no clear evidence that Beijing has directly told TikTok to remove content around the world. TikToks parent company responded to the Post investigation from last September by asserting that the platforms content moderation policies in the U.S. are handled by an American team and are not influenced by the Chinese government. But policymakers have expressed worries, in light of such observations as the aforementioned lack of Hong Kong protest videos on the platform, that TikTok is in fact (at Beijings direct behest or not) removing those kinds of content globally. This risk centers on whether and how TikTok could remove, for anyone using the app, a video critical of the CCP or that talks about concentration camps in Xinjiang, for example. In this case, nobody in the world would be able to access the content on TikTok once removed; the takedowns would be global.
Again, the national security risks here are not as direct as with data collection. Yet there are genuine concerns about the Chinese government exporting its censorship through platforms like TikTok. The worry is that Beijing compels high-demand Chinese-incorporated internet platforms to remove content worldwide. Beijings internet censorship practices, otherwise confined within Chinese borders, could hypothetically spread through this tactic.
This certainly presents risks to democracy and free speech. More teenagers in the United States are using TikTok to share political content. Political censorship is therefore not an insignificant issue. The takedown of certain critical videos could, for one thing, subtly influence platform users views of Beijing. And there are real concerns, especially in light of such investigations as the Washington Posts report last November that former U.S. [TikTok] employees said moderators based in Beijing had the final call on whether flagged videos were approved.
Risk 5: Disinformation on TikTok
Fifth and finally, there is concern among U.S. policymakers about potential disinformation on TikTok. Tons of U.S. teenagers use TikTok and consume political content through the application, so there is a concern that the users could amplify disinformation on the platform. This incursion of disinformation into U.S. public discourse is no doubt corrosive to the democratic process. Yet this is not a national security risk that is necessarily specific to TikTok.
Virtually every internet platform deals with disinformation; thus, that TikTok is Chinese incorporated in and of itself has nothing to do with it. But U.S. officials have expressed concern about the potential for disinformation on the platform. (These concerns arent unfounded: See the false information that circulated on TikTok about the coronavirus.) One could certainly make the argument that the platform responses to disinformationin light of political censorship concernsmight impact U.S. interests in undesirable ways. But the presence of disinformation on the platform is in many ways a distinct risk from the preceding four.
Looking Beyond TikTok
These questions, and the policy responses to them, have implications well beyond TikTok. And they have become increasingly urgent, as these questions about mobile apps, data collection and national security grow more frequent and as more bills like Sen. Hawleys are introduced into Congress.
The issues here are complex. If the view is that any data collected by a Chinese internet company is a national security riskbecause of Beijings purportedly easy access to that data, and the ways it could be potentially combined with other datasets (for example, from the Office of Personnel Management hack)then many applications fall into the bucket of risk. The widely used application WeChat, for example, could certainly be banned under that view.
But the problem is even more complicated. After all, China isnt the only country about which policymakers are or might be concerned.
Last fall, for example, Sen. Schumer sent a letter to the FBI requesting they investigate the security risks of Russian mobile apps. The letter cited the legal mechanisms available to the Government of Russia that permit access to data as reason for concern.
If Russian-made apps are also considered an unacceptable data collection risk for U.S. government employees, then how should the U.S. approach and maintain a list of countries that fit into that category?
The United States isnt alone in confronting these questions. And these arent entirely novel problems. Indias military, for example, has prohibited personnel from installing Chinese social platform WeChat due to security concerns. The Australian armed forces have also banned WeChat. The Pentagon banned the militarys use of geolocating fitness trackers in August 2018 after live GPS data was found on the public internet: Researchers were able to track the location of troops on military bases and spies in safe houses.
This all raises challenging questions about where to draw the line: Is an app that, hypothetically, makes custom emojis and collects only a users phone number more of a security risk than one that provides the weather based on current geographic location?
Meanwhile, its worth remembering that apps are only one potential way for a government to get access to information on individuals: The highly unregulated data brokerage industry, which sells incredibly intimate information on all kinds of people to whomever is buying, could easily be exploited by foreign governments. Governments could buy information from brokerage firms and ascertain sensitive activities of, say, a U.S. federal employee with a security clearance or a non-government employee who happens to be running for Congress in the next election.
Policymakers might consider crafting legislation based on the people on whom data is being collectedthat is, focusing on data collection of government employees, which presents immediate national security concerns, rather than about data collection on all Americans. Targeted bans on app downloads on government phones could be a solution, as Sen. Hawley proposed in his bill.
More broadly, one could imagine developing a framework of criteria to answer these questions that will arise again and again. This framework would function in the same way as would objective criteria by which to routinely evaluate other elements of digital supply chain security, another much-needed national security tool. For instance, the Committee on Foreign Investment in the United States could explicitly make data privacy and security a more central component of its investment screening process. Agencies like the Cybersecurity and Infrastructure Security Agency could lead an interagency process to determine government recommendations for baseline corporate cybersecurity standards writ large that, like with encryption, could be used subsequently by policymakers to evaluate protections implemented by firms like TikTok. Federal departments such as the Department of Defense could develop clear and at least semipublic frameworks by which they decide to prohibit employee use of mobile apps.
Again, though, even this route leads to more questions. What about American- or European-incorporated companies that collect disturbing amounts of sensitive personal information on U.S. government employees? Do they not fit these categories too? Policymakers need to consider these questions.
Policymakers also must consider whether these mobile app and data security decisions should depend less on the kinds of data collected and on whom, and more on the legal structures in the countries in which these companies are incorporated. Beijing, for instance, engages in unchecked surveillance. While the actual practice of Beijing getting data from private companies isnt as straightforward as some might imagine, its certainly far easier than the U.S. government getting access to American company data. For some policymakers, that difference might be the end-all-be-all to allowing Chinese apps on U.S. government employee phonesforget about details like the kinds of data in question.
And this is all without even getting into the risks of content censorship in China, content censorship globally and disinformationwhich pertain more to content management on an app like TikTok than they do directly to national security. This isnt to say (as clarified above) that no national security linkages exist or could exist to, say, TikTok removing political content worldwide at Beijings behest. But, rather, I suggest that the links to a U.S. national security threat from censorship and disinformation are generally not as pronounced as those from the collection of geolocation data on a U.S. federal employee with an active security clearance, for example.
This isnt just a laundry list of academic questions.
Some observers might find a TikTok ban to be a relatively narrowly targeted and sensible policy response to a perceived threat of Chinese state access to data. But the reality is that decisions in this sphere of data security and U.S. data protection are not made in a vacuum. They have broader implicationsfirst-order, second-order, and even third- or fourth-order effects. Many countries develop mobile apps, and many of them could be perceived as posing security risks in various ways. They, too, must be considered as part of the picture. A cohesive and repeatable strategy for making these decisions is far superiorfrom economic, national security and rights-protection perspectivesthan a whack-a-mole-style approach that might yield a sensible policy but not with a sensible process.
All the while, it is important not to blur and conflate these risks. The national security risks of mobile apps made and managed by foreign-incorporated companies may take different forms and may differ in likelihood, severity and desired response. Blurring the lines makes it hard to develop targeted policies that address actual risks in ways that fully consider costs and benefits.
Many countries worldwide are grappling with these same questions. Many governments, like Washington, are also considering if, where and how they want to decouple elements of their technology systems from other countries. Here, Washington should tread very carefully because these broader and global implications demand much more thought.
Go here to see the original:
Unpacking TikTok, Mobile Apps and National Security Risks - Lawfare
CDN and cloud suppliers join routing security initiative – ComputerWeekly.com
Major cloud suppliers and content delivery network (CDN) providers have joined a global initiative supported by the Internet Society to address security threats to internet routing systems.
Dubbed Mutually Agreed Norms for Routing Security (Manrs), the initiative calls for participants to take six specific actions to improve the resiliency and security of the routing infrastructure.
These actions, of which five are mandatory, include stopping incorrect routing from being propagated, preventing traffic of illegitimate source IP addresses and validating routing information on a global scale, among others.
The latest Manrs participants include Akamai, Amazon Web Services, Azion, Cloudflare, Google and Microsoft. The Internet Society said a number of other companies will also be joining the initiative soon.
CDNs and cloud providers help companies serve content and access online services by delivering it in a distributed manner, often from locations close to users.
They typically exchange traffic in what is known as peering with thousands of other networks to enable traffic to flow more efficiently around the world, making them key participants in the internets interconnection infrastructure.
But cyber criminals have found ways to manipulate how internet traffic is routed to launch attacks, such as a distributed denial of service (DDoS), by violating the underlying assumptions related to identity that are implicit in the routing, naming and addressing systems.
The participation of cloud and CDN suppliers in Manrs follows a World Economic Forum report released in January 2020 that called for internet service providers (ISPs) to join the initiative.
The Manrs community can leverage the new participants unique roles in the internet routing system, in particular their vast peering value, for the benefit of a more secure internet, said Andrei Robachevsky, the Internet Societys senior director for technology programmes.
The CDN and cloud community is integral to the internet ecosystem, and by joining Manrs, they are joining a community of ISPs and internet exchange points committed to making the global routing infrastructure more secure, he added.
Christian Kaufmann, Akamais vice-president for network technology, said being Manrs compliant improves the companys routing security capabilities while potentially helping other networks to improve theirs, too.
Cloudflare, a long-time proponent of better internet routing security, has been campaigning for the industry to adopt Manrs.
Route leaks have a cascading negative impact on businesses, and coordinated action is needed by the internet infrastructure community to improve the security, resilience, and reliability of networks, said John Graham-Cumming, chief technology officer at Cloudflare.
More here:
CDN and cloud suppliers join routing security initiative - ComputerWeekly.com
Setting up home-based office solutions busy business for Cape Breton company – The Telegram
SYDNEY, N.S.
An information technology department is a valuable tool these days for companies looking to set up work from home environments as efforts to limit face-to-face contact continue during the ongoing COVID-19 pandemic.
A local internet security firm has found itself working night and day setting up home offices for Cape Breton companies that haven't budgeted for their own ongoing IT departments.
"They are pieces we have always done," said Mark Patterson, CEO of Devantec IT and Security Services, in references to in-demand services of his company. "They are just a little more relevant today than they may have been a couple of months ago to some businesses."
The most popular of a variety of technology solutions that are helping business owners transition their employers to a home office is a virtual private network.
"The VPN would allow their workers to securely remote into their server from home and access all of their files just as they would if they were sitting in their office," he said. "That is the main solution we are using to help businesses."
For security reasons, specific names of clients could not be made available, however, Patterson said they are from all areas of industry, including telecommunications, power utilities, home heating and government.
Another popular service these days is one geared at companies who want to limit the control of traffic into offices where employees are still working.
"We are installing a lot of the video door systems so that when somebody comes up to the door, they buzz in and the person inside the business can communicate back and forth through the video system, versus letting them into the office and talking to them face-to-face."
He said these alarm and camera systems can be tailored to any business where they don't have anybody to "keep an eye on" things.
"We are a technology company, essentially, although we break it down into IT, security and communications," he said. "We can basically implement any type of technology that limits face-to-face interaction and help people abide by the current government guidelines."
Patterson said the company currently has seven employees who are putting in long hours as area businesses and individuals seek out their services to deal with the expectations and realities of the current business and social climate.
Devantec was established in 2016 by Patterson and James MacKinnon and provides high quality on-site and remote services including computer services, network security, business phone systems and security systems for businesses and homes of any size.
RELATED:
Read more:
Setting up home-based office solutions busy business for Cape Breton company - The Telegram
Society’s Dependence on the Internet: 5 Cyber Issues the Coronavirus Lays Bare – Nextgov
As more and more U.S. schools and businesses shutter their doors, the rapidly evolving coronavirus pandemic is helping to expose societys dependencegood and badon the digital world.
Entire swaths of society, including classes we teach at American University, have moved online until the coast is clear. As vast segments of society are temporarily forced into isolation to achieve social distancing, the internet is their window into the world. Online social events like virtual happy hours foster a sense of connectedness amid social distancing. While the online world is often portrayed as a societal ill, this pandemic is a reminder of how much the digital world has to offer.
The pandemic also lays bare the many vulnerabilities created by societys dependence on the internet. These include the dangerous consequences of censorship, the constantly morphing spread of disinformation, supply chain vulnerabilities and the risks of weak cybersecurity.
1. Chinas censorship affects us all.
The global pandemic reminds us that even local censorship can have global ramifications. Chinas early suppression of coronavirus information likely contributed to what is now a worldwide pandemic. Had the doctor in Wuhan who spotted the outbreak been able to speak freely, public health authorities might have been able to do more to contain it early.
China is not alone. Much of the world lives in countries that impose controls on what can and cannot be said about their governments online. Such censorship is not just a free speech issue, but a public health issue as well. Technologies that circumvent censorship are increasingly a matter of life and death.
2. Disinformation online isnt just speechits also a matter of health and safety.
During a public health emergency, sharing accurate information rapidly is critical. Social media can be an effective tool for doing just that. But its also a source of disinformation and manipulation in ways that can threaten global health and personal safety something tech companies are desperately, yet imperfectly, trying to combat.
Facebook, for example, has banned ads selling face masks or promising false preventions or cures, while giving the World Health Organization unlimited ad space. Twitter is placing links to the Centers for Disease Control and Prevention and other reliable information sources atop search returns. Meanwhile, Russia and others reportedly are spreading rumors about the coronaviruss origins. Others are using the coronavirus to spread racist vitriol, in ways that put individuals at risk.
Not only does COVID-19 warn us of the costs and geopolitics of disinformation, it highlights the roles and responsibilities of the private sector in confronting these risks. Figuring out how to do so effectively, without suppressing legitimate critics, is one of the greatest challenges for the next decade.
3. Cyber resiliency and security matter more than ever.
Our university has moved our work online. We are holding meetings by video chat and conducting virtual courses. While many dont have this luxury, including those on the front lines of health and public safety or newly unemployed, thousands of other universities, businesses and other institutions also moved online a testament to the benefits of technological innovation.
At the same time, these moves remind us of the importance of strong encryption, reliable networks and effective cyber defenses. Today network outages are not just about losing access to Netflix but about losing livelihoods. Cyber insecurity is also a threat to public health, such as when ransomware attacks disrupt entire medical facilities.
4. Smart technologies as a lifeline.
The virus also exposes the promise and risks of the internet of things, the globe-spanning web of always-on, always-connected cameras, thermostats, alarm systems and other physical objects. Smart thermometers, blood pressure monitors and other medical devices are increasingly connected to the web. This makes it easier for people with pre-existing conditions to manage their health at home, rather than having to seek treatment in a medical facility where they are at much greater risk of exposure to the disease.
Yet this reliance on the internet of things carries risks. Insecure smart devices can be co-opted to disrupt democracy and society, such as when the Mirai botnet hijacked home appliances to disrupt critical news and information sites in the fall of 2016. When digitally interconnected devices are attacked, their benefits suddenly disappear adding to the sense of crisis and sending those dependent on connected home diagnostic tools into already overcrowded hospitals.
5. Tech supply chain is a point of vulnerability.
The shutdown of Chinese factories in the wake of the pandemic interrupted the supply of critical parts to many industries, including the U.S. tech sector. Even Apple had to temporarily halt production of the iPhone. Had China not begun to recover, the toll on the global economy could have been even greater than it is now.
This interdependence of our supply chain is neither new nor tech-specific. Manufacturing medical and otherwise has long depended on parts from all over the world. The crisis serves as a reminder of the global, complex interactions of the many companies that produce gadgets, phones, computers and many other products on which the economy and society as a whole depend. Even if the virus had never traveled outside of China, the effects would have reverberated highlighting ways in which even local crises have global ramifications.
Cyber Policy in Everything
As the next phase of the pandemic response unfolds, society will be grappling with more and more difficult questions. Among the many challenges are complex choices about how to curb the spread of the disease while preserving core freedoms. How much tracking and surveillance are people willing to accept as a means of protecting public health?
As Laura explains in The Internet in Everything, cyber policy is now entangled with everything, including health, the environment and consumer safety. Choices that we make now, about cybersecurity, speech online, encryption policies and product design will have dramatic ramifications for health, security and basic human flourishing.
Laura DeNardis is a professor of communication studies at American University School of Communication and Jennifer Daskal is a professor of law and faculty director of the Technology, Law & Security Program at American University.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Excerpt from:
Society's Dependence on the Internet: 5 Cyber Issues the Coronavirus Lays Bare - Nextgov
Open Source Code – The Future of User Privacy – Privacy News Online
Will we see more and more open source software in the future, or is this a passing trend that will die off eventually?
According to survey data, open source is definitely here to stay. Right now, around 78% of companies actually run open source software, and that trend will likely continue to grow. Open source code benefits businesses a lot, after all, since they get to enjoy better security, scalability, and much easier deployment as ProPrivacy discusses in their guide: Why is open source important?
But what does that mean for you, the end user? Will you enjoy better privacy? Short answer yes. But if youre looking for more detail, keep reading.
Heres why open source code is the only way to enjoy true privacy, and why you should use an open source VPN client if you want to secure your online data.
Open source code is something thats open to the public. Basically, anyone can inspect, copy, learn from, and sometimes even edit it without fear of legal repercussions. To truly be open source, the software must also have an open source license that meets all the standards of the Open Source Definition.
Nowadays, most developers publish their open source code on GitHub.
Comparatively, closed source code only belongs to the company, team, or person who created it. Nobody else can use or inspect it, unless they want to meet the long arm of the law.
Yes. There are no ifs or buts here.
If you are extremely focused on privacy, open source is the only way to go especially when using a VPN.
Were not saying a closed source VPN client cant be trusted at all. But if youre the kind of person who needs to have full control over their Internet privacy, open source options are simply better for your sanity.
Well, OpenVPN, SoftEther, and WireGuard for starters. OpenVPN is the most popular, but SoftEther and WireGuard are much more lightweight (meaning you get good security and smooth speeds).
But using either of those options isnt as simple as just installing a client on your device. You need a bit of technical know-how to set everything up. Maybe WireGuard might go smoother since its more user-friendly. But youll still have to buy and set up your own server which can cost you anywhere between $15 and $100 per month.
Besides those options, you might see some articles recommending a few other open source solutions. But theyre not too popular or user-friendly, and most of them only run on Linux.
Luckily, at PIA we have also started embracing open source announcing a shift towards open source back in 2018, and recently offering our Android code open for inspection meaning all PIA VPN clients are now open source VPN clients.
Whats more, we have even started reaching out to external auditors. And, also recently launched a closed Beta for the WireGuard protocol.
So at PIA were definitely committed to full transparency and user privacy. If youd like to learn more about the pros of using PIA, check out this in-depth review (dont worry, you can easily scan through it).
The future is open source. The stats prove it, and its really the only way to go when it comes to guaranteeing user privacy and helping people trust brands (especially VPNs).
Why else do you think people should use an open source VPN client? Or do you believe closed source options are better for privacy? Share your thoughts with us in the comments below.
WireGuard is a registered trademark of Jason A. Donenfeld.
Read this article:
Open Source Code - The Future of User Privacy - Privacy News Online
GLOBAL INTERNET SECURITY FIREWALL MARKET LATEST DEVELOPMENTS, SHARES, AND STRATEGIES EMPLOYED BY THE MAJOR PLAYERS – The Fuel Fox
This report focuses on Global Internet Security Firewall Market status, future forecast, growth opportunity, key market, and key players. The study objectives are to present the Internet Security Firewall Market development in the United States, Europe, and China.
In 2019, the global Internet Security Firewall Market size was million US$ and it is expected to reach million US$ by the end of 2025, with a CAGR of during 2025-2025.
The report also summarizes the various types of Internet Security Firewall Market. Factors that influence the market growth of particular product category type and market status for it. A detailed study of the Internet Security Firewall Market has been done to understand the various applications of the usage and features of the product. Readers looking for scope of growth with respect to product categories can get all the desired information over here, along with supporting figures and facts.
Get Sample: https://www.lexisbusinessinsights.com/request-sample-120202
Top Key players: SAP, Hewlett Packard Enterprise, Cellusys, Openmind Networks, Tata Communications, ANAM Technologies, AMD Telecom, Adaptive Mobile, Infobip, EVOLVED INTELLIGENCE, MOBILEUM, and OMOBIO
Internet Security Firewall Market: Regional Segment Analysis.
This report provides pin-point analysis for changing competitive dynamics. It offers a forward-looking perspective on different factors driving or limiting market growth. It provides a five-year forecast assessed based on how the Internet Security Firewall Market is predicted to grow. It helps in understanding the key product segments and their future and helps in making informed business decisions by having complete insights of market and by making an in-depth analysis of market segments.
Key questions answered in the report include:
What will the market size and the growth rate be in 2026?
What are the key factors driving the Global Internet Security Firewall Market?
What are the key market trends impacting the growth of the Global Internet Security Firewall Market?
What are the challenges to market growth?
Who are the key vendors in the Global Internet Security Firewall Market?
What are the market opportunities and threats faced by the vendors in the Global Internet Security Firewall Market?
Trending factors influencing the market shares of the Americas, APAC, Europe, and MEA.
The report includes six parts, dealing with:
1.) Basic information;
2.) The Asia Internet Security Firewall Market;
3.) The North American Internet Security Firewall Market;
4.) The European Internet Security Firewall Market;
5.) Market entry and investment feasibility;
6.) The reports conclusion.
All the research report is made by using two techniques that are Primary and secondary research. There are various dynamic features of the business, like client need and feedback from the customers. Before (company name) curate any report, it has studied in-depth from all dynamic aspects such as industrial structure, application, classification, and definition.
The report focuses on some very essential points and gives a piece of full information about Revenue, production, price, and market share.
Internet Security Firewall Market report will enlist all sections and research for every point without showing any indeterminate of the company.
Reasons for Buying this Report
This report provides pin-point analysis for changing competitive dynamics
It provides a forward-looking perspective on different factors driving or restraining the market growth
It provides a six-year forecast assessed based on how the market is predicted to grow
It helps in understanding the key product segments and their future
It provides pin point analysis of changing competition dynamics and keeps you ahead of competitors
It helps in making informed business decisions by having complete insights of market and by making an in-depth analysis of market segments
TABLE OF CONTENT:
1 Report Overview
2 Global Growth Trends
3 Market Share by Key Players
4 Breakdown Data by Type and Application
5 United States
6 Europe
7 China
8 Japan
9 Southeast Asia
10 India
11 Central & South America
12 International Players Profiles
13 Market Forecast 2025-2025
14 Analysts Viewpoints/Conclusions
15 Appendix
Get Global Internet Security Firewall Market Complete Brochure @ https://www.lexisbusinessinsights.com/request-sample-120202
About Us:
Statistical surveying reports is a solitary goal for all the business, organization and nation reports. We highlight a huge archive of most recent industry reports, driving and specialty organization profiles, and market measurements discharged by rumored private distributors and open associations. Statistical surveying Store is the far-reaching gathering of market knowledge items and administrations accessible on air. We have statistical surveying reports from a number of driving distributors and update our gathering day by day to furnish our customers with the moment online access to our database. With access to this database, our customers will have the option to profit by master bits of knowledge on worldwide businesses, items, and market patterns
Contact Us:
Lexis Business Insights
Aaryan
(Director- Business Development)
US: +1 210 907 4145
APAC: +91 98677 99788
[emailprotected]
http://www.lexisbusinessinsights.com
See the original post:
GLOBAL INTERNET SECURITY FIREWALL MARKET LATEST DEVELOPMENTS, SHARES, AND STRATEGIES EMPLOYED BY THE MAJOR PLAYERS - The Fuel Fox