ACI in Forbes: Cybersecurity Alert … Your GPS Works, but Not For Long

On September 1, 1983, Korean Airlines Flight 007 accidentally strayed into the Soviet Union’s airspace and was shot down by a Soviet Su-15 Interceptor, falling into the Sea of Japan and killing 269 passengers and crew, including about two dozen children and U.S. Congressman Larry McDonald. Ridiculously, the Soviets initially denied it, but later claimed […]

ACI in the Daily Caller: When It’s your turn to Be Hacked!

Willie Sutton said he goes after banks because that is where the money is. Hackers go after retail databases because that’s where the data is. Willie’s banks knew they’d been robbed when they heard bullets hitting the wall. Today’s retail outlets may get a firewall breach alarm but confirmation comes when banks start telling the […]

Cybersecurity–Our Worst People Can Defeat Best People

Most of us presume that official intelligence agencies run with deep paranoia, rarified sophistication, and beyond the control of laws that apply to the public at large.  Their target is to harvest warnings of enemy penetrations of our security and to discover our enemies’ capabilities and activities.  We cannot be sure how well they perform […]

Cyber-Attack Detection is Difficult, Needs Monitoring

Despite cyber-prowess and a staggering and secret budget, US intelligence agencies appeared unable to halt a deep and sustained invasion of sensitive federal information.  In May, an attack hit the IT system of the Office of Personnel Management (OPM) and its data stored at the Department of the Interior’s data center. Information for about 4 […]

It’s No Longer Safe to Ignore Cybercrimes

The nation-state hackers breaching our government and private information systems are the same enemies we face in the physical world.  They are the same countries that demonstrate no respect for human life, and certainly none for privacy.  Although our laws give the military and law enforcement a monopoly on fighting back against cybercriminals, the weakness […]

Cyber Security Might Begin With Modest Legislation

  Several data security bills are afoot in the House.  They identify obligations triggered by a cyber-breach of entities who collect and maintain personal information of individuals.  A congressional bill, H.R. 1770, defines personally identifiable information (PID) and requires notification of consumers whenever there is an important breach of PID that is stored by a […]

A Few Good Ideas in the Administration’s Cybersecurity Proposal

In a January 2015 legislative proposal on Cybersecurity, the Administration offered three suggestions on Cybersecurity. First, information sharing between the private sector and government on cyber threats has been a useful practice in some sectors since before 2007. The Administration wants that expanded. Secondly, some courts and law enforcement seem unsure of their authority to […]

Sony, North Korea, the US, and the Mistake of Hackers

Consumers were alerted to the cyber-attack on Sony evidently conducted by North Korea (NK) in return for a stoner movie called The Interview.  As it stands, the US seems to be doing little and Sony has round-filed the offending movie.  Sony executives had let their sharp tongues overrun their good judgment in emails that criticized […]

The Enemy of My Enemy is My Cyber-Lessee

Cyber skills can provide countries with aggressive capabilities disproportionately greater than their population or GDP. The US tries to cloak its cyber prowess in silence, somewhat like China and Russia.  Smaller actors such as South Korea and Iran either want others to know or they ineptly cover their tracks. Some nations such as Israel and […]

Security and Trust are Both Lost

A decade ago, Internet privacy violations were often pranks by script kiddies hoping to out-do each other through website defacements.  Today, such juvenile antics attract little notice.   Instead, more news covers criminal gangs from Eastern Europe who steal personal account and password information for bank and credit accounts.  Personal information and credit card numbers for […]