Cyber Security/Protection

Leaks as a foreign policy instrument

Most information of late about U.S. cyber activities has come from unnamed, but likely authorized, government sources. These choreographed disclosures allow the administration to signal to adversaries that it views certain actions as infringing upon U.S. national interests while creating plausible deniability that keeps options open and limits domestic political risks. [node:read-more:link]

AI in the real intelligence world

Artificial intelligence, already in widespread use in gathering data for a range of purposes, needs to be hardened against attack if the intelligence community is to exploit its full potential. Dean Souleles, a key technology advisor within the Office of the Director of National Intelligence in Washington examines, among other things, how Open Source Enterprise can be used to keep pace with developments. [node:read-more:link]

Cybersecurity mishandled in U.S

Despite the “expenditure of substantial resources,” the U.S. State Department stands accused by  internal auditors of continued failure to secure itself against cyberattacks. Its Office of the Inspector General says in a new report that “significant” shortcomings put sensitive information at risk at home and abroad. [node:read-more:link]

Meng extradition ruling reserved

The B.C. Supreme Court judge hearing the extradition case against detained Huawei executive Meng Wanzhou has reserved her ruling. Associate Chief Justice Heather Holmes did not indicate when her decision would be announced. [node:read-more:link]

Responding to cyber threats

Canada can learn a lot from its allies about how to tackle the accelerating threats in the cyber domain, the main lesson being that governments working in isolation cannot deal effectively with the onslaught. This is according to a report published 30 January by the Canadian Association of Defence and Security Industries. It says in The Cyber Collaboration Imperative that the attacking forces have a fundamental tactical advantage that requires new policies and decision-making processes as well as an integrated public and private response. [node:read-more:link]

EU permitting limited 5G use

A day after Britain announced a similar approach, the European Union said 29 January that it prefers not to impose a blanket ban on the Chinese telecom giant Huawei’s 5G technologies. Instead, in the latest setback for the U.S. campaign against Huawei, the EU’s governing commission has unveiled security measures which including blocking access to “critical and sensitive” elements of European mobile networks. [node:read-more:link]

Congress upset at Brits’ 5G decision

The British government’s decision to allow limited use of Huawei 5G technology has prompted a group of Republicans in the U.S. Congress to introduce a bill designed to curtail intelligence sharing with the U.K. One says Britain’s decision gives China a “foothold” to conduct espionage as well as more economic and political leverage. [node:read-more:link]

Canada 5G plans practicable?

As Canada considers its 5G options and possible Huawei involvement despite U.S. security concerns, a prominent researcher says the government is putting together a policy which she described as logical. However, Catherine Rosenberg at the University of Waterloo, suggests that it remains “unclear” whether the policy would work the way the government would like. [node:read-more:link]

Huawei partly OK in U.K.

The Chinese telecom giant Huawei is being allowed by the British government to continue providing 5G service but will be prohibited from supplying hardware for “sensitive parts” of the network. Britain and other allies, including Canada, are being pressed by the U.S. to block Huawei on grounds that it could compromise national security but Foreign Secretary Dominic Raab says the government’s decision would not affect its intelligence-sharing relationship. [node:read-more:link]

An electoral challenge for Canada

The prospect of voter coercion and foreign election interference in Canada’s electoral process evidently pits the right to privacy against the right to freedom of expression. This is according to a briefing note prepared for Privy Council President Dominic LeBlanc and made public through an Access to Information request. [node:read-more:link]

Huawei remains an issue for U.S.

National Security Advisor Robert O’Brien has revived concerns that permitting the Huawei 5G technology into the U.S. would give China access to “sensitive and personal information” through backdoors built into its software. The U.S. administration insists the global telecom giant is bound to spy on behalf of Beijing, a claim Huawei and China consistently deny. [node:read-more:link]

“Juice jacking” security threat

Public charging stations commonly found in many airports and other hubs are reportedly being used by criminals to gain access to personal data on mobile phones, tablets or laptops. So-called “juice jacking” evidently facilitates the installation of malware when a device is connected to a compromised power point even for a short-tern boost. [node:read-more:link]

Huawei 5G still contentious in U.K.

China's ambassador to Britain says Conservative politicians opposed to Huawei’s involvement in the 5G network are conducting “kind of a witch-hunt”. Reacting to a letter written by a group that includes former cabinet ministers who want “high risk” companies banned, the envoy insists that Huawei is a private company with no ties to the Chinese government. [node:read-more:link]

Huawei 5G in Canada

As Canada’s partners within the Five Eyes security coalition take different approaches to the use of Huawei 5G technology, Ottawa has yet to decide whether to permit its use and a new Angus Reid poll indicates that Canadians are divided. Some 56 per cent favour following the U.S., Australia and New Zealand in banning Huawei, 34 per cent like Britain’s limited use policy and 10 per cent evidently would have no issue with Huawei building the entire 5G infrastructure. [node:read-more:link]

ISPs face data-sharing orders

Internet service providers would be compelled to share data with the Cybersecurity and Infrastructure Security Agency under the terms of a bipartisan bill currently before a U.S. Senate committee. A related bill has been approved by its equivalent committee in the House of Representatives. [node:read-more:link]

Pages

Subscribe to RSS - Cyber Security/Protection