Inside Sources: Federal Ban on Huawei Protects Both National Security and Consumers

As long as Beijing is able to call the shots, Huawei poses an outsized menace to American national security, businesses, and consumers. If governments around the world are clamping down on the threat that Huawei poses, it’s high time that Washington do the same when the public’s interests are at risk. You can read this […]

Camera Surveillance of the Public

In China, a complex system is being developed to assign “social credit” scores to residents. The scores will reflect the value of an individual’s condoned or condemned behaviors. The system will use surveillance cameras and perhaps microphones in public areas to record what passersby are doing and with whom they are meeting. The recordings are […]

Managing Huawei 5G Security Risks

Huawei 5G equipment carries an inherent security risk because the gear can contain covert circuitry capable of analyzing others’ information and reporting back to Beijing, or creating a cascade of failures. Huawei ‘s tight relationship with and funding from the Chinese government and military makes it a unique cyber risk if it were deployed in […]

China’s Internet Propaganda Seeks to Manage U.S. Consumer Perceptions

The Chinese government uses many of its state-run media to implant in the U.S. internet a “distorted and biased narrative portraying a utopian view of the Chinese government and party.” The propaganda is intended to undermine western values that China deems would erode party domination. It uses paid social media posters to place propaganda and […]

Cyber Bureaucracy versus Repelling Our Attackers

In “an offensive step forward.” the Trump Administration discarded President Obama’s policy on cyberattack and cyber defense (also known as Presidential Policy Directive-20 or PPD-20).  Trump’s replacement “cyber deterrence plan” was ready in mid-May, but its release was delayed because of disputes over retaliatory hacking measures.  Meanwhile nation state cyberattacks continue and handwringing has been […]

Cloud Computing and Internet Security

Cloud computing service providers (CSPs) differ in the capabilities, security and prices they offer. CSPs usually offer software as a service, platform as a service or infrastructure as a service. Most commonly, consumer use of CSPs is as a storage platform where they push digital pictures, music, and documents into “the cloud” and retrieve those […]

Website Operators Held Accountable for Others’ Misdeeds as Well As For Their Own

In the early 1990s, the Internet was like the unbridled Wild West of the 1890s.  In the early 1990s, standards of Internet practice were almost nonexistent.  You could start almost any kind of business you could afford and there were no Internet Sheriffs to enforce common sense, let alone “the law.”  The standards were only […]

Equifax Walks Slowly Toward Its Seppuku

The hackers who attacked Equifax exposed vital personal identification data—including social security numbers, names, addresses and dates of birth—of potentially as many as 143 million Americans. Quickly after Equifax revealed the massive damage, advice to consumers started flowing, but this time, the advice was somewhat questionable. Authorities urged consumers to sign up for the free […]

The Need for Better IoT Security

The next wave of technological improvement for consumers, and for retail and industrial applications is expected to be the Internet of Things (IoT). Some early IoT applications have shown promise. Some have created noteworthy problems such as security failures. IoT devices and software are seldom equipped with adequate safeguards that prevent hackers from taking control […]

Is A Quiet Cyber War Replacing The Cold War?

Wannacry (aka Wannacrypt) is a cyberattack worm that encrypts data on a computer and asks for a ransom payment in order to decrypt that data. The victimized computers cannot perform their normal functions, and cannot retrieve from their databases. Wannacry was spreading rapidly through Western Europe and the US during mid-May 2017. Wannacry might well […]