<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security &#8211; The Beacon</title>
	<atom:link href="https://blog.independent.org/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.independent.org</link>
	<description>The Blog of The Independent Institute</description>
	<lastBuildDate>Tue, 02 Jun 2020 08:38:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.7.2</generator>
	<item>
		<title>Media Up In Arms Over Twitter, Remains Silent on EARN IT Act’s Threat</title>
		<link>https://blog.independent.org/2020/05/30/media-up-in-arms-over-twitter-remains-silent-on-earn-it-acts-threat/</link>
		
		<dc:creator><![CDATA[Mary L. G. Theroux]]></dc:creator>
		<pubDate>Sat, 30 May 2020 22:24:08 +0000</pubDate>
				<category><![CDATA[The Beacon]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://blog.independent.org/?p=48345</guid>

					<description><![CDATA[<p>The media is up in arms over Trump’s threat to sign an executive order removing the legal immunity that social media platforms currently enjoy. Yet they have for months been completely silent on Congress’s greater threat that utilizes the exact same legal provision: the proposed EARN IT Act that would weaken Americans’ online privacy...<br /><a href="https://blog.independent.org/2020/05/30/media-up-in-arms-over-twitter-remains-silent-on-earn-it-acts-threat/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/05/30/media-up-in-arms-over-twitter-remains-silent-on-earn-it-acts-threat/">Media Up In Arms Over Twitter, Remains Silent on EARN IT Act’s Threat</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The media is up in arms over Trump’s threat to sign an executive order removing the legal immunity that social media platforms currently enjoy. Yet they have for months been completely silent on Congress’s greater threat that utilizes the exact same legal provision: the proposed EARN IT Act that would weaken Americans’ online privacy and security precisely at a time that our lives are lived almost entirely virtually.</p>
<p><span id="more-48345"></span></p>
<p><a href="https://www.law.cornell.edu/uscode/text/47/230">Under U.S. Code §230</a>, social media companies and internet service providers alike are currently classified as media channels, and accordingly, not legally liable for the accuracy of information made available through them, as publishers are. </p>
<p>Trump’s executive order would remove immunity for social media companies when they engage in “editorial conduct” such as removing posts or adding their own commentary. The difference provides Twitter, YouTube and others powerful incentives not to restrict what can be posted, or to add “<a href="https://twitter.com/WhiteHouse/status/1266342941649506304">warnings</a>” or “<a href="https://www.youtube.com/watch?v=1zrejG-WI3U&#038;feature=emb_logo">Context</a>” links to sources disputing the information posted by their users.</p>
<p>In early March, Senate Judiciary Committee Chairman Lindsey Graham (R-SC), U.S. Senators Richard Blumenthal (D-CT), Josh Hawley (R-MO) and Dianne Feinstein (D-CA) introduced the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT Act) that threatens the legal immunity of internet service providers under the same §230 until and unless they can prove they have “earned” it—by acting as the government’s agents in spying on their customers.</p>
<p>In other words, internet service providers (ISPs) will henceforth be judged as guilty until they prove their innocence.</p>
<p>Under the guise of “protecting the children,” the EARN IT Act would grant immunity only to ISPs certifying that they have complied with unidentified &#8220;Best Practices&#8221; for preventing child exploitation. Congress will develop these &#8220;Best Practices,&#8221; in secret at a later date, and <a href="https://www.eff.org/deeplinks/2020/03/earn-it-act-violates-constitution">could well</a> &#8220;compel internet service providers to break encryption or be exposed to potentially crushing legal liability.&#8221; </p>
<p>Government&#8217;s utilizing this strategy to attack privacy and encryption is certainly not new. In 2014, President Obama&#8217;s Attorney General Eric Holder issued <a href="https://blog.independent.org/2014/10/06/nsa-mission-creep-its-for-the-children/">similar warning</a> of the dire threat that privacy and encryption pose &#8220;to entice trusting minors to share explicit images of themselves.” Government officials seemingly cannot stand the thought that Americans have any information that it is not privy to, and setting up false straw men is their tried-and-true means of manufacturing a crisis already being addressed by industry.</p>
<p>While <a href="https://www.judiciary.senate.gov/press/rep/releases/graham-blumenthal-hawley-feinstein-introduce-earn-it-act-to-encourage-tech-industry-to-take-online-child-sexual-exploitation-seriously">the bill&#8217;s sponsors</a> claim the Act is needed to &#8220;Encourage Tech Industry to Take Online Child Sexual Exploitation Seriously,&#8221; ISPs already take it extremely seriously, providing millions of reports annually, including more than <a href="https://www.theverge.com/2020/2/7/21128223/child-abuse-videos-report-facebook-twitter-snap-google-microsoft">70 million images of child abuse</a> in 2019 alone.</p>
<p>Meanwhile, government has repeatedly shown that information in its hands is regularly used as fuel for abuse of the innocent. And Apple, Facebook, and other major Silicon Valley firms <a href="https://www.wsj.com/articles/fbi-discovers-al-qaeda-link-in-pensacola-attack-11589809330">assert</a> that &#8220;undermining their security protocols would make all of their users vulnerable to malicious cyberactivity, a view most independent experts share.&#8221;</p>
<p>In short, when government forces open &#8220;backdoors&#8221; into encrypted information, bad guys (whether its own agents or outsiders) are sure to follow.</p>
<p>So while the EARN IT Act would likely provide no meaningful additional protections from child exploitation, it would definitely produce a very chilling effect on the encryption that currently protects millions of Americans from cyber-attacks and malicious online actors—as well as on the development of stronger and better cybersecurity in an increasingly online world.</p>
<p>Especially with the Coronavirus shut-down forcing all of us to conduct increasing amounts of our personal and professional activities online, there could be no worse time to weaken the current encryption that provides us important security and privacy protections, nor disincentivize improvements to it.</p>
<p>Would that the media shone as bright a light on Congress&#8217; threats to all Americans as it directs on Trump&#8217;s critiques of Twitter.</p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/05/30/media-up-in-arms-over-twitter-remains-silent-on-earn-it-acts-threat/">Media Up In Arms Over Twitter, Remains Silent on EARN IT Act’s Threat</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Department Flunks Data Security ... Again</title>
		<link>https://blog.independent.org/2015/11/20/u-s-department-flunks-data-securityagain/</link>
		
		<dc:creator><![CDATA[Vicki E. Alger]]></dc:creator>
		<pubDate>Sat, 21 Nov 2015 00:11:33 +0000</pubDate>
				<category><![CDATA[The Beacon]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[US department of education]]></category>
		<guid isPermaLink="false">http://blog.independent.org/?p=31833</guid>

					<description><![CDATA[<p>Earlier this week the full House Committee on Oversight and Government Reform blasted the U.S. Department of Education for its lax security surrounding student data. But this isn’t the first time ED’s been taken to the woodshed. The Government Accountability Office (GAO) reported in 2011 that ED still hadn’t implemented security controls recommend in...<br /><a href="https://blog.independent.org/2015/11/20/u-s-department-flunks-data-securityagain/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2015/11/20/u-s-department-flunks-data-securityagain/">U.S. Department Flunks Data Security ... Again</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignright size-medium wp-image-31840" src="http://blog.independent.org/wp-content/uploads/2015/11/computer-230x153.jpg" alt="computer" width="230" height="153" srcset="https://blog.independent.org/wp-content/uploads/2015/11/computer-230x153.jpg 230w, https://blog.independent.org/wp-content/uploads/2015/11/computer-102x68.jpg 102w, https://blog.independent.org/wp-content/uploads/2015/11/computer.jpg 450w" sizes="(max-width: 230px) 100vw, 230px" />Earlier this week the full <a href="https://oversight.house.gov/hearing/u-s-department-of-education-information-security-review/">House Committee on Oversight and Government Reform</a> blasted the U.S. Department of Education for its lax security surrounding student data. But this isn’t the first time ED’s been taken to the woodshed.</p>
<p>The <a href="http://www.gao.gov/products/GAO-11-194">Government Accountability Office</a> (GAO) reported in 2011 that ED <em>still</em> hadn’t implemented security controls recommend in 2009 by its own Education Office of the Inspector General (IG). And, just this week the <a href="http://www.gao.gov/products/GAO-16-228T">GAO <em>again</em> documented</a> ED’s numerous information security weaknesses and deficiencies.</p>
<p>As. Rep. Mark Meadows (R-NC) summed up, “You know, the headline should read: ‘Department of Education Gets an F&#8217;.” (Starting at 46:31, first video)</p>
<p><span id="more-31833"></span>According to the <a href="https://oversight.house.gov/hearing/u-s-department-of-education-information-security-review/">committee website</a>:</p>
<blockquote><p>The U.S. Department of Education is responsible for managing the portfolio of over 40 million federal student loan borrowers holding over $1.18 trillion in outstanding debt obligations. The Department also manages other student aid programs, such as the Pell Grant program that annually serves 8.3 million students. These programs often require applicants and their parents to provide the Department with their PII [personally identifiable information].</p>
<p>In FY2014, the IG found that, “While the Department made progress in strengthening its information security program, many longstanding weaknesses remain and the Department’s information systems continue to be vulnerable to serious security threats.”</p></blockquote>
<p>The committee also highlighted many more alarming security deficiencies:</p>
<ul>
<li>ED has at least 139 million unique social security numbers in its Central Processing System (CPS).</li>
<li>ED, however, has ignored the IG, which documented 6 repeat findings and 10 repeat recommendations in its most recent report.</li>
<li>ED scored <em>NEGATIVE</em> 14 percent on the Office of Management and Budget (OMB) <a href="https://fcw.com/Articles/2015/09/11/OMB-post-cyber-sprint.aspx">CyberSprint</a> for total users using strong authentication.</li>
<li>ED earned an “F” on the Federal Information Technology Acquisition Reform Act (FITARA) <a href="http://www.fiercegovernmentit.com/story/no-winners-and-3-failing-grades-fitara-implementation-scorecard/2015-11-04">scorecard</a>.</li>
<li>ED’s National Student Loan Database (NSLD) gives 97,000 accounts/users access to borrower data, but less than 20 percent have had background checks for security clearance.</li>
<li>ED’s systems are so vulnerable IG investigators hacked into them and had <a href="http://federalnewsradio.com/cybersecurity/2015/11/government-testers-easily-bypassed-education-defenses-recent-cyber-audit/">unfettered access for hours</a>—all without detection.</li>
</ul>
<p>So committee members’ harsh words should come as no surprise. As Rep. Will Hurd (R-TX) put it:</p>
<blockquote><p>IG reports show that since 2011 there was no mechanism to restrict the use of unauthorized devices on the network. Having the ability to find devices on your network, does it really take four years to figure that out? ... This is completely unacceptable. This is the kind of issue that the American people are completely frustrated with.</p></blockquote>
<p>Absolutely.</p>
<p>A leading reason why is that those of us in the real world would face consequences for such lack of performance. As a result of private-sector security breaches in recent years, chief information officers (CIOs) and other executives <a href="http://www.csoonline.com/article/2859485/data-breach/9-data-breaches-that-cost-someone-their-job.html">resigned or were fired</a>, and their companies have <a href="http://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0">paid tens of millions of dollars</a> in legal settlements and other corrective actions.</p>
<p>No so in the land of Fed ED.</p>
<p>When pressed by Committee Chair Jason Chaffetz (R-UT) to answer the basic question of how many data centers ED is responsible for, <a href="http://www2.ed.gov/about/offices/list/ocio/bio.html">Dr. Danny Harris</a>, ED’s CIO, responded, “I don’t know, Mr. Chairman.” (Starting at 43:26, first video)</p>
<p>After hearing Inspector General Kathleen Tighe confirm that her agents had, in fact, breached ED’s systems undetected, an exasperated Rep. Meadows asked Harris: “Are you willing to stake your reputation and your job on the fact that the system is secure?” “I am, sir,” was Harris’ initial reply, until he back-pedaled about resigning if there was ever a breach.</p>
<p>Ultimately, Rep. Meadows asked Harris how confident he is on a scale of one to 10 that there will not be a breach. “Seven,” said Harris. (Starting at 49:31, first video).</p>
<p>In response, Rep. Jody Hice (R-GA) demanded to know, “How in the world can you give yourself a 7 out of 10 when you’re using technology that isn’t even supported?...When can we expect the system to be secure?” (Third video clip; or 101:56 first video).</p>
<p>Harris didn&#8217;t have a response, but he promised that he and his colleagues are working really, really hard. So a whole lot of effort but no good answer. Sounds like <a href="http://blog.independent.org/2014/04/21/common-core-makes-simple-math-as-complicated-as-the-tax-code/">Common Core math</a>.</p>
<p align="center">* * *<u></u><u></u></p>
<p>For the authoritative examination of the history and impact of the U.S. Department of Education and the need for innovative reforms based on educational choice and opportunity, see the Independent Institute’s widely acclaimed book, <em><u><a href="http://www.independent.org/store/book.asp?id=119" target="_blank" data-saferedirecturl="https://www.google.com/url?hl=en&amp;q=http://www.independent.org/store/book.asp?id%3D119&amp;source=gmail&amp;ust=1471639407552000&amp;usg=AFQjCNGnYUhEDb-3aYPwzOMXrkD4d6VAuw"><i>Failure: The Federal Misedukation of America’s Children</i></a></u></em>, by Vicki E. Alger.</p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2015/11/20/u-s-department-flunks-data-securityagain/">U.S. Department Flunks Data Security ... Again</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
