Study: Addressing Privacy and Security Concerns with Distributed Tech without Impeding Innovation

In May 2018, the Federal Bureau of Investigation (FBI) published a warning notifying that Russian computer hackers had compromised hundreds of thousands of home and office routers and could collect user information or shut down network traffic. The Bureau then urged the owners of several brands of routers to turn them off and on again, and […]

Inside Sources: Data Privacy Should Also Be Congress’ Concern

Data Privacy Day reminds consumers once a year of the need to protect online data and privacy, but it is the role of Congress legislate workable policy solutions. The Congress should acknowledge that protecting the online privacy of American consumers is a non-partisan issue, and it should be one of its priorities in 2019. A […]

China’s Plague of Cyber Breaches

China seems to regard cyberattacking as a venue in which it can compete, or even win, against the U.S. There is no single source for Chinese hacking. There appear to be groups closely affiliated with China’s intelligence organizations and groups with a more commercial footing. Chinese hackers have purposes ranging from political influence to monetary […]

Recent Commercial and Nation State Cyber Breaches

In late June, the Little Red Hen Restaurant suffered a commercial attack that diverted visitors away from its website. The Red Hen website was subjected neither to graffiti nor to political criticism. Instead, the breach altered the website so that it sent visitors to a reproductive health products site. It appears the Red Hen’s recent […]

Cyber Warfare is Cheaper Than Conventional Warfare

In Moscow, for just a few million per year, you can operate a successful digital propaganda crew.  Russia does.  A crew might consist of 3 analysts devising attack themes and scripts plus a few hackers using high speed internet service, regular office equipment, and specialty items such as space on remote servers for staging attacks. […]

Regulations Creeping Toward Social Media Sites

Changes in consumer preferences for news, entertainment and social interactions have boosted the importance of sites such as Google+, Facebook, Twitter and others.  In turn, these sites monetize their extreme popularity by selling space and promotional tools to advertisers.  While social media’s financial success is noteworthy, many consumers believe that social media sites shortchange consumer […]

Cybersecurity Policy Requires Thoughtful Work from Congress

In a David Grogan interview last Oct 4th, White House Cybersecurity Coordinator Rob Joyce made remarks on law enforcement (LEOs) access to private communications and information.  He encouraged Internet service firms to be ready with cooperation for law enforcement requests for access to private information.  In an Aug. 22, 2017 interview, Joyce also said that […]

Privacy Is an Important but Not Ultimate Consideration

Do you worry that Comcast and Verizon might use your age, gender and address to concoct an effectively targeted advert?  Most of us would prefer to see fewer adverts, and when we shop on the Internet, we do not need an advert’s help to find want we want.  The marginal improvement in an advert made […]

A Few Good Ideas in the Administration’s Cybersecurity Proposal

In a January 2015 legislative proposal on Cybersecurity, the Administration offered three suggestions on Cybersecurity. First, information sharing between the private sector and government on cyber threats has been a useful practice in some sectors since before 2007. The Administration wants that expanded. Secondly, some courts and law enforcement seem unsure of their authority to […]

The Enemy of My Enemy is My Cyber-Lessee

Cyber skills can provide countries with aggressive capabilities disproportionately greater than their population or GDP. The US tries to cloak its cyber prowess in silence, somewhat like China and Russia.  Smaller actors such as South Korea and Iran either want others to know or they ineptly cover their tracks. Some nations such as Israel and […]