The United States is the leader in happiness, health, and cyber power

Date:

Share post:

[ad_1]

Welcome to Cyber ​​Security 202! Nooooooo. Please don’t combine one of my favorite things, octopuses, one of my least favorite things, with robots doing things I don’t.

Below: Ukraine warns of impending Russian cyberattacks, while Biden administration and TikTok offer security deal But first:

Ranking the top players in cyberspace, both the usual suspects and the unexpected

The United States ranks 16th. World happiness List, last place Health care systems Among the 11 countries with the highest income and on the 129th International Peace Index. But there is still one area where it is number 1: cyber power.

That is according to the second edition. National Cyber ​​Power Directory Today it is part of the Cyber ​​Project at Harvard’s Kennedy School’s Belfer Center.

The index will return after the 2020 open edition. No. 1 and No. 2 are the same as before – the United States and China – Russia has moved to the 3rd place and several countries like Iran, Ukraine, Vietnam and South Korea have rocketed up the list.

The list ranks 30 nations on a variety of factors, including offense and defense. It seeks to measure capabilities across eight objectives, such as the ability to gather foreign intelligence or disrupt a competitor’s infrastructure. Those at the top of the list demonstrate both an aptitude for cyberpower and a willingness to use it.

“I think it’s important to try to apply external data and indicators to analyze this.” Lauren ZabierekThe CEO of Cyber ​​Project told me. “Because how do you try to start the conversation and develop that understanding?”

One goal of the list is to look beyond the countries that come up most in conversations about cyber. United States, China, Russia, Iran and North Korea. Surrounded by a fair number of “the usual suspects” like France or the Netherlands, North Korea doesn’t even crack the top 10 index.

That’s the full top 10 in order: United States, China, Russia, United Kingdom, Australia, Netherlands, South Korea, Vietnam, France and Iran.

  • The top climbers include Iran (from 22nd to 10th), Ukraine (from 12th to 29th), South Korea (from 7th to 16th) and Vietnam (from 8th to 20th).

For example, after the war with Russia, Ukraine has demonstrated its defensive capabilities, and Iran has become more aggressive in its use of cyber for financial purposes.

While North Korea ranks only 14th, it fares better than other countries in that financial category.

The United States, on the other hand, is at a high level in all fields, especially in intelligence gathering using its destructive capabilities and cyber.

The International Institute for Strategic Studies (IISS) was convened Its own cyber power levels Last year, using a different method and system, but concluding that the United States is at its own level in cyberspace.

Both have rating systems drawn questions About their methods, but some have questioned whether they are worth anything.

“Trying to assess cyber power quantitatively and qualitatively is a purely subjective exercise, raising questions about the validity of the ratings themselves, regardless of the methodology used.” Emilio IaselloA cyber professional and former Defense Intelligence Agency intel officer; He wrote last year Details about IISS. “It is more art than science to consider issues such as cyber dependency and capacity building, global governance impact (none of which have been worked out by anyone), strategic presence and, above all, military doctrine (which is often not publicly available).”

Editors of today’s report: Julia V, Irfan Hemani And Daniel Cassidy – Accepting some restrictions on physical activity.

“Given the sensitivity of some aspects of cyber power, particularly its destructive, deterrent and surveillance capabilities, and reliance on domestic national security structures, governments may be deliberately keeping their intentions and capabilities from public knowledge for strategic purposes,” they write.

But “just because something is hard doesn’t mean we shouldn’t try,” Zabirek said.

“We know the weaknesses of the index…but we maintain that this is better than nothing.” She said. We know we’re starting to witness these important cyber power conversations, and we know they’ll spark a debate we’re proud of.

While many states have created election integrity units, Arizona is a cautionary tale.

They are Republicans across the country citing widespread voter fraud. Embrace the method of attack This November, our colleagues Beth Reinhard and Yvonne Wingate-Sanchez report that government agencies must mobilize the power and resources to investigate election crimes.

But an earlier Washington Post investigation to sniff out fraud in Arizona has resulted in thousands of election-related complaints, but has brought only 20 charges over the past three years.

Rather than bolstering the strength of citizens’ local voting systems, the Post’s review found that the state’s Election Crimes Unit is creating more falsehoods and mistrust and draining valuable government resources — an example of the dangerous consequences of government officials exercising their power. To reinforce the false claim that voter fraud is a critical issue in American elections.

Ukraine raises alarm over new wave of ‘massive cyber attack’ from Russia

The Military Intelligence Service of Ukraine is warning about this. Russia is planning “massive cyber attacks”. targeting critical infrastructure of Ukraine and its close allies, particularly Poland and the Baltic States; Cyberscope‘s AJ Vicens reports.

The Defense Intelligence Agency of Ukraine expects the next wave of cyberattacks to focus on the country’s energy sector, with the aim of obfuscating the offensive being taken by the Ukrainian military and increasing the devastating effect of missile attacks on the country’s energy supply facilities, the agency said. In the statement It is posted on the government website.

The experience of cyber attacks on Ukrainian power systems 2015 And 2016 It will be used when doing jobs,” the adviser warned, referring to two Kremlin-backed attacks on the country’s power grid that left Ukrainians without heat and electricity in mid-winter.

The announcement came from Google researchers about a A growing body of evidence This suggests that pro-Russian hackers and online activists are coordinating with the country’s military intelligence agency. Wall Street JournalRobert McMillan and Dustin Volz recently reported.

But the announcement of Ukraine It has some people in the cyber security world confused. Above it Lack of details.

In the US, Tik Tok has submitted a security agreement

They are the Biden administration and TikTok. Hammer the details The first deal would allow the video-sharing platform to continue in the United States without requiring the owner, Chinese Internet giant ByteDance, to sell. New York Times.

The deal is still in progress. But people familiar with the terms of the deal said it would require the company to act on three key issues.

  1. Changing the storage Information for Americans serving in the United States, not in Singapore and Virginia.
  2. Bringing Oracle To control the app’s powerful algorithms that determine what content TikTok recommends to its users.
  3. Creating a board of security experts To monitor US activities reporting to the federal government.

Next steps: Senior officials at the Justice Department, which is leading negotiations with the company, and the Treasury Department have criticized the current draft as not doing enough on China or addressing the administration’s national security concerns. That, coupled with the upcoming midterm elections, could force changes to the terms and delay a final decision on the case for months.

The Times story arrived in the UK on the same day A fine of 29 million dollars raised the prospect It may violate data protection law.

Activities in the fight against spam articles

The Federal Communications Commission voted 4-0 on Friday Approve the proposal to limit spam articlesMargaret Harden McGill reports Axios.

“The American people are fed up with fraudulent articles, and we need to use every tool at our disposal to do something about it,” the chairwoman said. Jessica Rosenwersel.

This is only one step in the life of regulations. The approved proposal, pending a vote for about a year, seeks comment on a proposal that would require cell phone companies to block spam texts from known illegal and fraudulent numbers. It’s a process that could add months to the schedule.

And it is unlikely that Congress will act to amend the relevant 1991 law. which does not reflect today’s technology. “Politicians themselves want to send these articles without fear of prosecution.” Margot Saunderssenior counsel for the National Consumer Law Center told Axios.

Watchdog dings IRS for vendor security deficiencies (FCW)

State Department says Putin may send Snowden to war (Daily Beast)

How did ‘Chinese coup’ tweets go viral, and what does it say about the rapid spread of information (cyberscope)?

Viasat hack did not significantly affect Ukraine’s military communications, official says (Zero Day)

Cyberattack on InterContinental Hotels disrupts business at franchisees (Wall Street Journal).

US-Israel defense firm says Elbit system was hacked (TechCrunch)

Thanks for reading. see you soon.



[ad_2]

Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

spot_img

Related articles

Ragini Kasturi A Versatile Force in Indian Music 28345

Ragini Kasturi: A Versatile Force in Indian Music In the dynamic landscape of Indian music, few artists can make...

Divya Tyagi Makes Her Playback Singing Debut in “A Morning In Kashmir -8426

Divya Tyagi Makes Her Playback Singing Debut in "A Morning In Kashmir Renowned for her soulful devotional songs and...

New Soundboard Review: Pricing is Not Always the Only Criteria

I actually first read this as alkalizing meaning effecting pH level, and I was like, OK I guess...

Technology Will Help Keep Your Smartphone from Becoming Obsolete

I actually first read this as alkalizing meaning effecting pH level, and I was like, OK I guess...