The United Nations’ International Telecommunications Union has taken the unprecedented step of adopting a standard for the Internet that would essentially permit eavesdropping on a global basis.
According to a just-published piece on the RT.com web site, ITU members decided to adopt a standard, known as Y.2770, which would permit the inspection of Internet traffic. This inspection of emails and message content would be the physical world equivalent of opening any piece of mail and reading what is inside. The only defense against this is encryption. Keep reading →
Cloud computing leaders from the governments of Canada, China, Japan and the United States pledged their continued international cooperation to fulfill cloud computing‘s potential to transform public services worldwide.
The leaders made their comments, while also touching on a range of legal, security and data standards issues during an executive session at the 5th annual Cloud Computing Forum & Workshop, sponsored by the National Institute of Standards and Technology (NIST) Tuesday. Keep reading →
Acts of cyber aggression on governments and businesses are now considered a top risk globally. Earlier this year the World Economic Forum (WEF) released their 2012 report on Global Risks. That report looked at fifty areas of risk across specific domains such as the economy, the environment, geopolitics, society and technology.
Five of the top ten risks, however, were closely if not directly related to the cyber domain and cybersecurity concerns. Among them: Keep reading →
The demise of an industry icon, Nortel Networks, as the evidence has now made clear, was the result of a cyber attack. Who could forget Nortel Networks’s place in the technology landscape? While the company is gone, their equipment is still in operations throughout the world.
In an article that appeared in the Wall Street Journal, it was reported that hackers had roamed freely inside Nortel’s vast corporate network for over a decade and contributed to the company going bankrupt in 2009.
Indications are that the attacker’s traffic was traced back to China. This came as a result of countless hours poring over log files until the investigators found the needle in the haystack.
According to Brian Shields, a long time Nortel employee and the point person on the investigation, the cyber espionage activities resulted in the exfiltration of technical papers, R&D documents, business plans, emails and other documents. They had full access to very sensitive information about the technology and plans of the company.
For years now, U.S. intelligence organizations and subject matter experts have warned of the vast array of clandestine cyber espionage activities of the Peoples Republic of China (PRC). While some of these activities are the result of organizations in the private sector, the government is often cited as the sources of the acts of espionage. Naturally, the Chinese government has denied these allegations. Keep reading →
Federal CIO Steven VanRoekel recently announced the development of a new Mobile Strategy at this year’s Consumer Electronics Show in Las Vegas. I was there, and was glad to hear his perspective on the potential of mobile technology for government, especially since GSA has been working hard to realize that potential.
Putting mobile IT to the test Keep reading →
COMMENTARY - Some lawmakers on Capitol Hill are hell bent on implementing the recommendations of President Barack Obama’s Cyberspace Policy Review, in which the administration argued for a greater role for the Department of Homeland Security in securing the nation’s critical infrastructure from cyber attack.
And to prove how serious and misguided they are, some of these lawmakers like Sen. Joseph Lieberman (I-CT) and Sen. Majority Leader Harry Reid (D-NV) are about to introduce legislation that arguably will hurt innovation and jobs, and which may actually grant the DHS extraordinary regulatory powers that extend to the Internet. Keep reading →