In 1993, Pete Steiner published the New Yorkers most reproduced cartoon of all time: A mutt on a computer commenting to a fellow hound, On the Internet, nobody knows youre a dog.
At the time, Steiners cartoon captured an amusing point about the early days of going online, and how hard it was to figure out who was really who. Twenty-seven years later, those dogs are long-dead (because dog years), yet the cartoon is truer than ever.
If anything, the problem has gotten worse. In 2020, dogs on the internet are being actively weaponized. Identity is the most commonly exploited attack vector used to breach systems and commit cybercrimes. A report published in 2019 showed that more than 80 percent of breaches could be traced to some sort of compromised digital identity. More recently, dogs on the internet have been exploited by foreign adversaries to interfere in our democracy through social media manipulation.
There is a reason why we are still struggling with this issue 27 years later: Its a very hard problem to solve. But we are getting closer to some useful answers and, with some timely investments in digital identity infrastructure, we can make a dent in the problem.
* * *
As the National Institute of Standards and Technology (NIST) pointed out in a 2017 publication:
Digital identity presents a technical challenge because this process often involves proofing individuals over an open network, and always involves the authentication of individual subjects over an open network . The processes and technologies to establish and use digital identities offer multiple opportunities for impersonation and other attacks.
The problem has only been exacerbated by recent events. As the United States shifts to social distancing because of the coronavirus, the challenges with dogs on the internet are taking on new, more complex dimensions:
But it doesnt have to be this way. Indeed, most of our peerssuch as Canada, Australia, the United Kingdom and the European Uniondo not have the same problems (at least not to the same degree as we do). As a March 24 European Commission announcement boasted:
Thanks to the trust enablers eID and the eIDAS regulation, citizens do not need to leave their homes to interact with public administrations, they do not have to meet face-to-face to sign or even mail documents. In times of crisis, this is another way to achieve social distancing.
Why is the U.S. so far behind? While our international peers have invested in digital identity solutions, our federal and state governments have stayed stubbornly rooted to paper and plastic credentials.
In the governments absence, industry has tried to fill the gap. They have built products such as knowledge-based verification (KBV) as an alternative to government-verified identity. But KBV can get you only so farand today attackers often know the answers to the questions in KBV quizzes, just as they know the last four digits of your Social Security number. As attackers have caught up with these solutionsand identity fraud has risenit has become clear that there is no substitute for the unique role that government plays as the authoritative source conferring legal identity.
The governments unique role in identity verification arises because it has proved to be in the best position to address our challenges and make identity better. Not by issuing a national ID but by allowing consumers to request the government to stand behind the paper and plastic credentials it already issues in the physical world.
As Congress and the Trump administration prepare to consider a fourth coronavirus stimulus bill, they should recognize that most of the economy has shifted to a digital basis and invest in foundational building blocks of digital infrastructure. Digital identity is one such building block.
Where should the government focus? Echoing recommendations from the Better Identity Coalition, we offer three suggestions.
First, the government should establish a Federal Digital Identity Task Force (with sufficient funding) assigned to craft and implement a government-wide approach to digital identity. Today, some agencies dabble in digital identity solutionseither for supporting their own online services or for providing limited data-validation tools for the private sectorbut there is no coordinated approach. What is needed is leadership, a government-wide approach for agencies to stand up new privacy-enhanced identity-validation services rooted in consumer consent, along with seed money (we estimate that no more than $50 million is necessary, which is a pittance in the post-pandemic world) for agencies to establish new digital identity services.
Second, NIST should create a Digital Identity Framework to ensure that any government agency, be it at the federal, state, or local level, can follow a standard approach to creating digital identity services that is secure, is designed around the needs of consumers and protects their privacy. This, too, will require only modest funding.
The idea of government taking a bigger role in digital identity raises concerns about the impact new identity services might have on security and privacy. The best way to mitigate these concerns is to make sure that any deployed services follow standards that set a high bar for security and privacy, thereby making sure new identity tools preserve privacy and empower consumers rather than create risks.
Third, yet more money. (Yes, it is a theme, but the benefits are so great that we think it worthwhile.) The federal government should fund new grants to the states for digital identity. The Department of Motor Vehicles (DMV) is the one place where almost every adult American goes through a robust, in-person identity-proofing process that is based on a federal standard (REAL ID). DMVs are ideally suited to help improve identity through mobile drivers license applications and other identity-validation services. But they have antiquated infrastructure, and DMVs dont have an incentive to focus on these issues.
These new grants could provide up to a billion dollars in seed money over five years to help states start to invest in closing the identity gapby rolling out new mobile drivers licenses and other digital identity solutions. Dollars could be spent only on solutions that implement the NIST Framework, thereby ensuring that federal investment fund systems set a high bar for privacy and security, and are interoperable across states.
While this is a large investment, the security and efficiency benefits to the country will be significant. States can leverage these solutions to enable more trusted online services, cut down on fraudulent benefits claims and protect citizen information. And by allowing their residents to ask the state to vouch for them online when they are looking to prove their identity in the private sector, states provide a critical service to businesses that are eager to know if prospective clients are internet dogs or legitimate customers.
* * *
Countless services, including banking, health care, government and e-commerce, depend on knowing who is on the other side of a transaction. In 2020, the ability to offer high-value transactions and services online is being tested more than ever, due in large part to the challenges of proving identity online. The lack of an easy, secure and reliable way for entities to verify identities of people they are dealing with online creates friction in commerce, leads to increased fraud and theft, degrades privacy, and hinders the availability of many services online.
The United States must act to improve identity verification. These three initiatives (a federal task force to lead the effort, standards from NIST and funding to help state DMVs upgrade their technology) will not solve every challenge in the identity space, but they represent three common-sense steps that are practical to implement and will be meaningful in their impact; they will make the state of digital identity better. And they will make the dogs on the internet entertainment, rather than nefarious weapons.
Here is the original post:
The Weaponization of Dogs on the Internet - Lawfare
- IT spending on Internet connectivity, security to rise in India: Report - Business Insider India - July 6th, 2020
- VPNs are the need-of-the-hour for safe and fast connections as we work-from-home - The Hindu - July 6th, 2020
- What is network security in the cloud computing era? - TechRadar - July 6th, 2020
- Revealed: How home router manufacturers dropped the ball on security - TechHive - July 6th, 2020
- Malaysia Internet of Things (IoT) Security Market Growth By Manufacturers, Type And Application, Forecast To 2026 - 3rd Watch News - July 6th, 2020
- Akamai Is an Overlooked Web Infrastructure Play. Its a Buy, Analyst Says. - Barron's - July 6th, 2020
- According to Latest Report on Internet of Things (IoT) Security Market to Grow with an Impressive CAGR - 3rd Watch News - July 6th, 2020
- Enterprise Firewall Market Overview and Regional Outlook with Research Study 2019 2026 - 3rd Watch News - July 6th, 2020
- How Have I Been Pwned became the keeper of the internets biggest data breaches - TechCrunch - July 6th, 2020
- Global Internet of Things (IoT) Security Market Trends, Opportunities, Key Players, Growth, Analysis, Outlook & Forecasts To 2026 - Daily Research... - July 6th, 2020
- WISeKey develops WIShelter Covid-19 secured smartphone app, using digital IDs and blockchain protocols, to certify users that are not infected with... - July 6th, 2020
- Cryptocurrencies Adding to the Safety and Security in the UK Gambling Industry - London Post - July 6th, 2020
- Voice recordings from domestic violence alerting app exposed on the internet - Security Boulevard - June 30th, 2020
- The lack of women in cybersecurity puts us all at greater risk - The Next Web - June 30th, 2020
- Cascading Security Through the Internet of Things Supply Chain - Lawfare - June 30th, 2020
- How to Build the Right Security Assessment - Security Boulevard - June 30th, 2020
- Apple may have just changed a key part of how the internet works - TechRadar - June 30th, 2020
- Indians most concerned about identity theft - Fortune India - June 30th, 2020
- Deeper Connect Mini: Decentralized, Private and Secure Internet for the People, launching June 30th on Indiegogo. - Yahoo Finance - June 30th, 2020
- Internet of Things (IoT) Security: Technologies and Global Markets - Yahoo Finance - June 30th, 2020
- Could Donald Trump claim a national security threat to shut down the internet? - Brookings Institution - June 30th, 2020
- Internet of Things Security Market Strategic Insights 2020 with analysis of Leading players: Check Point Security Software Technologies, Cisco... - June 30th, 2020
- Global IT Security Market is accounted for xx USD million in 2019 and is expected to reach xx USD million by 2025 growing at a CAGR of xx% : Blue... - June 30th, 2020
- Internet of Things (IoT) Security Market Size, Share, Growth, Revenue, Global Industry Analysis and Future Demand |Globalmarketers.biz - Cole of Duty - June 30th, 2020
- Surge in encrypted malware prompts warning about detection strategies - SecurityBrief Europe - June 30th, 2020
- NexTech AR to supply its video conferencing and virtual events platform to Dallas Independent School District - Proactive Investors UK - June 30th, 2020
- Dutch people are least concerned about safety, survey reveals - IamExpat in the Netherlands - June 30th, 2020
- Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks - TechRepublic - June 24th, 2020
- WatchGuard Technologies Report Finds Two-Thirds of Malware is Encrypted, Invisible Without HTTPS Inspection - GlobeNewswire - June 24th, 2020
- How To Turn Off Firewall In Windows And Mac - Ubergizmo - June 24th, 2020
- OTF's Work Is Vital for a Free and Open Internet - EFF - June 24th, 2020
- Microsoft acquires CyberX to bolster Azure IoT security - Internet of Things News - IoT Tech News - June 24th, 2020
- Partner Content: ESET and Spire Technology on why you need a Password Manager - PCR-online.biz - June 24th, 2020
- Internet of Things (IoT) Security Market to Witness Robust Expansion Throughout the Forecast Period 2020 2025 - 3rd Watch News - June 24th, 2020
- Google is on a mission to stop you from reusing passwords - The Verge - June 24th, 2020
- Marking the 30th Anniversary of the Internet and Cybersecurity Treaty - CircleID - June 24th, 2020
- The Cyberlaw Podcast: Using the Internet to Cause Emotional Distress is a Felony? - Lawfare - June 24th, 2020
- DDoS Protection Market 2020 | How The Industry Will Witness Substantial Growth In The Upcoming Years | Exclusive Report By MRE - Cole of Duty - June 24th, 2020
- Julian Assange Extradition and the Freedom of Bitcoin Bitcoin... - Bitcoin Magazine - June 24th, 2020
- How to become a web developer? - The Tribune - June 24th, 2020
- Frost & Sullivan Report Finds BlackBerry Solutions Address 96% of the Enterprise Threat Landscape - PRNewswire - June 24th, 2020
- EAC to evaluate testing and certification of non-voting equipment - Politico - June 24th, 2020
- Global IT Security Spending Market Projected to Reach USD XX.XX billion by 2025- Check Point Software Technologies, Cisco Systems, EMC, Fortinet,... - June 24th, 2020
- OPAQ Webinar to Share Lessons Learned and Best Practices from Zero Trust Migration Project with TTX Company - Business Wire - June 24th, 2020
- Global Internet of Things (IoT) Security Technology Market 2020 Analysis, Types, Applications, Forecast and COVID-19 Impact Analysis 2025 - NJ MMA... - June 24th, 2020
- Put Your Risk on Mute: Using PKI to Simplify Remote Workforce Security - Hashed Out by The SSL Store - Hashed Out by The SSL Store - June 24th, 2020
- NetNumber Expands Industry Recognized Signaling Firewall to Protect SIP Connections - GlobeNewswire - June 24th, 2020
- How to fight back against Covid-19 scams - Global Banking And Finance Review - June 24th, 2020
- What Will The Crypto Market Look Like In A Post COVID-19 Economy? | Coin Insider - Coin Insider - June 24th, 2020
- US: Congress Should Back Open Technology Fund - Human Rights Watch - June 21st, 2020
- David Pratt: Will the next global pandemic take place online? - The National - June 21st, 2020
- Global Internet of Things (IoT) Security Industry Market Insights, Opportunity, Analysis, Market Shares & Forecast 2020 2027 - 3rd Watch News - June 21st, 2020
- Facial recognition to play key role in travel reopening as biometrics industry weighs social responsibility - Biometric Update - June 21st, 2020
- 'IT Act does not protect freedom of speech' - The Sunday Guardian - June 21st, 2020
- In Depth Analysis and Survey of COVID-19 Pandemic Impact on Global Distributed Denial Of Service (DDoS) Protection Market 2020 Key Players A10... - June 21st, 2020
- Cyber Liability Insurance Market (USD 4.6 Billion) Will Grow At A CAGR of 11.12% During Forecast Period 2020-2025 (Impact Analysis of COVID-19) - 3rd... - June 21st, 2020
- Internet of Things Security Market research report presents a thorough study on the overall market by Application Forecast To 2020 - Surfacing... - June 21st, 2020
- Global Internet of Things (IoT) Security Product Market 2020 SWOT Analysis & Key Business Strategies by Leading Industry Players and Forecast 2025... - June 21st, 2020
- Knoxville still quiet on ransomware attack and what's being done to fix it - Knoxville News Sentinel - June 21st, 2020
- Indias digital workforce needs secure software. Testing, not banning apps, is the answer - ThePrint - June 21st, 2020
- Bolton book can be released, but conduct 'raises grave national security concerns' - ABC News - June 21st, 2020
- Broadband Connection Disconnected: Things You Can Do To Fix It - TelecomTalk - June 21st, 2020
- Former Google CEO Eric Schmidt says there's 'no question' Huawei routed data to Beijing - CNBC - June 21st, 2020
- Dating Apps Exposed 845 GB of Explicit Photos, Chats, and More - WIRED - June 21st, 2020
- Internet Security Software Market: Qualitative Analysis of the Leading Players - News by aeresearch - June 11th, 2020
- Global Internet Security Market 2020 by Manufacturers, Size, Development Analysis, Applications and Forecast to 2025 - Cole of Duty - June 11th, 2020
- Internet Security Software Market 2019 Break Down by Top Companies, Countries, Applications, Challenges, Opportunities and Forecast 2026 - Cole of... - June 11th, 2020
- Internet Security Software Market Impact Of Covid-19 And Benchmarking. - Personal Injury Bureau UK - June 11th, 2020
- Drivers is Responsible to for Increasing Internet Security Software Market Share, Forecast 2027 - Cole of Duty - June 11th, 2020
- Webroot Internet Security with Antivirus Protection Software | 3 Device | 1 Year Subscription | PC Download - The Report - June 11th, 2020
- Endpoint Security Market to Cross US$ 10,026 MN by 2026, Growing Adoption of Work from Home Services to Favor Growth: Fortune Business Insights -... - June 11th, 2020
- Internet of Things (IoT) Security Market 2019 Break Down by Top Companies, Countries, Applications, Challenges, Opportunities and Forecast 2026 - Cole... - June 11th, 2020
- Yukon's Gurdeep Pandher tries to spread some joy on social media - Lindsay Advocate - June 11th, 2020
- Microsoft Windows users in UAE advised to install security updates - Khaleej Times - June 11th, 2020
- Clear guidelines for remote work will boost security and control access - TechRepublic - June 5th, 2020
- Mozilla Funds Meething to Help Fix the Internet - GlobeNewswire - June 5th, 2020
- The Internet of Bodies is here. This is how it will change our lives - World Economic Forum - June 5th, 2020
- Crowdstrike CEO explains how the future of remote work and security will look - CNBC - June 5th, 2020
- Mocana Recognized as Industry Leader in Cybersecurity and the Industrial Internet of Things - GlobeNewswire - June 5th, 2020
- SC Awards Europe 2020 - CISO/CSO of the Year - SC Magazine UK - June 5th, 2020