June 8, 2020 — States that utilized cloud computing for cybersecurity initiatives were better positioned to handle the surge in cybersecurity attacks that resulted from network vulnerabilities being amplified by increased telework during COVID-19.
As cities prepare for up to 70 percent of IT workers to continue working remotely, a panel of cybersecurity experts and city leaders discussed the future of security analytics, as well as other cybersecurity initiatives taken in response to the pandemic, on a webinar Monday sponsored by Nextgov and Route Fifty.
“All the challenges municipality leaders faced before are going to be harder as we become more dependent than ever on the internet and have yet to address a lot of fundamental questions,” said David Forscey, managing director of the Aspen Cybersecurity Group, referencing the lack of cybersecurity advocacy and governance that exists in the country.
Forscey called for smaller counties to move some of their cybersecurity services to the cloud, as many counties with less resources are not capable of offering comparable services, especially when they lack a cybersecurity workforce.
Cloud computing utilizes artificial intelligence to pinpoint bad actors and help with the classification of data. To predict and defeat cyberattacks in real time, cybersecurity must move to the cloud, panelists said. The cloud can leverage big data and instant analytics over a large collection of end users to instantly address and predict threats.
Managing infrastructure for security threats can prove difficult, said Tye Hayes, Chief Technology Officer for the city of Atlanta. Hayes detailed the city’s current plans to close three of its five data centers as part of their strategy to adapt to the cloud.
Hayes also called for the need to diversify risk by utilizing both on-site and cloud data services. She highlighted the importance on relying on cloud computing partners, as cybersecurity is their core competency.
A further security challenge had to be remedied when the city prohibited the use of bring-your-own-device policies for cybersecurity reasons, meaning all workers suddenly had to have access to a county device at home. Hayes recollected handing out 1500 laptops in a weeks’ time.
The devices were scanned for vulnerabilities before they were centrally patched, to allow for city overseers to remotely update the devices against looming security threats.
The use of virtual private networks, which enable users to share data over public networks as if they were private, expanded to increase workers ability to safely convey sensitive information.
Led by Wyden, Democrats Call on NTIA to Reform Privacy Standards for .US Domains
The Democratic legislator called on NTIA end the automatic disclosure of .US web domain users’ personal information.
WASHINGTON, September 21, 2022 – A bicameral coalition led by Sen. Ron Wyden, D-Ore., on Wednesday called on the National Telecommunications and Information Administration to end the automatic disclosure of .US web domain users’ sensitive personal information.
The all-Democrat coalition – including Sen. Elizabeth Warren, D-Mass.; Sen. Brian Schatz, D-Hawaii; and Rep. Anna Eshoo, D-Calif. – laid out its concerns Wednesday in a letter to Administrator Alan Davidson of the NTIA:
“It is highly concerning that NTIA, since at least 2005, has not directed its contractors administering .US to adopt any protections for this sensitive information. The automatic public disclosure of users’ personal information puts them at enhanced risk for becoming victims of identity theft, spamming, spoofing, doxxing, online harassment, and even physical harm,” the coalition wrote.
Rejecting the NTIA’s current disclosure policy, the coalition called anonymity “a necessary component of free speech” and argued that with better privacy protections, .US domains would be more attractive to new website creators.
Besides making .US users’ information private, the letter recommends requiring users’ “affirmative, informed consent” for all third-party data transfers, strengthening barriers against law-enforcement investigations, and notifying users if a foreign government seeks access to their data. The coalition stated that instituting stronger privacy measures wouldn’t increase rates of online crime.
“A privacy- protective .US should support NTIA in these negotiations by providing a model for best practices in the broader domain name ecosystem. We urge you to continue the fight for privacy, expression, and human rights,” the letter said.
EU’s Digital Services Act May Be a Model for the United States
The Digital Services Act imposes transparency requirements and other accountability measures for tech platforms.
September 16, 2022 – European Union’s Digital Service Act, particularly its data-sharing requirements, may become the model for future American future tech policy, said Mathias Vermeulen, public policy director at the AWO Agency, at a German Marshall Fund web panel Monday.
Now in the final stages of becoming law, the DSA aims to create a safer internet by introducing transparency requirements and other accountability measures for covered platforms. Of note to the German Marshall Fund paneliests was the DSA’s provision that, when cleared by regulators, “very large online platforms” – e.g., Facebook and Twitter – must provide data to third-party researchers for the purpose of ensuring DSA compliance.
In addition, the EU’s voluntary Code of Practice on Disinformation was unveiled in June, requiring opted-in platforms to combat disinformation by introducing bot-elimination schemes, demonetizing sources of alleged misinformation, and labeling political advertisements, among other measures. Signatories of the Code of Practice – including American tech giants Google Search, LinkedIn, Meta, Microsoft Bing, and Twitter – also agreed to proactively share data with researchers.
Vermeulen said that he expects the EU will soon draft new legislation to address the privacy concerns raised by the Digital Service Act’s data-sharing requirements.
The risks of large-scale data sharing
To protect user privacy, the DSA requires data handed over to researchers to be anonymized. Many experts believe that “anonymous” data is generally traceable to its source, however. Even the EU’s recommendations on data-anonymization best practices acknowledges the inherent privacy risks:
“Data controllers should consider that an anonymised dataset can still present residual risks to data subjects. Indeed, on the one hand, anonymisation and re-identification are active fields of research and new discoveries are regularly published, and on the other hand even anonymised data, like statistics, may be used to enrich existing profiles of individuals, thus creating new data protection issues.”
An essay from the Brookings Institution – generally supportive of the DSA’s data-sharing provisions – argues that many private researchers do not have the experience necessary to securely store sensitive data, recommending that the EU Commission establish or subsidize of secure centralized databases.
Jeff Pulver and Noah Rafalko: A Humble Request to the FCC on Robocalls
Blocking bad actors requires a whole new way of thinking, the authors say in this ExpertOp exclusive to Broadband Breakfast.
Should the Federal Communications Commission seek out alternative platforms to solve their 2022 spam, scam and robocall issues? Yes! Does Blockchain offer valuable solutions? Yes! We would like to ask the FCC to increase the width of their lens when it comes to deploying solutions to solve their growing number of systemic challenges.
Any action to stop robocall insanity and tech-driven scams would be welcome. While Americans deal with the linger pandemic, mass shootings, an uncertain economy and war in Europe, the constant annoyance from scammers and 4.1 billion robocalls a month is just too much. Most people have responded by literally giving up voice communications all together.
Recently implemented legislation called STIR/SHAKEN is a step in the right direction, but it is not a long-term solution. The FCC is simply taking old standards and applying them to new technologies. New thinking is needed; the next generation of technology must be explored. And the most promising of the new tools to protect our telecommunications system from fraudulent players lies in blockchain.
The key to stopping these nefarious acts lies in a digital identity solution powered by blockchain – a shard database or ledger. An identity solution enables customers to be confident that the communication is truly from enterprises they know and trust.
With blockchain, only authorized and verified messages get through. Spam and robocalls are virtually eliminated in one shot. All that’s required is a slight change in how we approach communications.
In a world where consumers are already doing whatever they can to self-manage their identity, it isn’t a large leap of faith to imagine adding a certified, digital ID to our telephone numbers.
Consumers freely use their telephone numbers to attest and manage their identity – even more than they use their Social Security numbers, birthdays, mother’s maiden name and secret questions. In our current digital universe, consumers use their phone numbers to register for store discounts, receive health and safety alerts and even transfer money to others.
And in their effort to stop spam and robocalls, consumers willingly add apps such as Hiya, paying over $300 million a year to these intermediaries.
The FCC needs to evolve and embrace the technology that allows consumers and mobile carriers who have a shared stake in attesting their identities. They need to recognize that blockchain technology offers an elegant, all-encompassing solution to the $40 billion in fraud that consumers fall victim to every year.
It’s time we leveraged a solution that’s already being used in other countries such as India, where blockchain technology helps protect over 600 million citizens from spam and robocalls.
Back in 2004, when the future of telecommunications was being written, the FCC was challenged with laying down rules governing Voice over Internet Protocol (VoIP). At that time, we hosted brown-bag lunches for Congress, and held open demonstration days at the FCC as well as a mini-trade show on the Hill in our effort to inform and educate Congress, staffers and other government employees on the latest and greatest innovations in Internet communications technology.
The FCC would be wise to revisit this practice of show and tell where they hear from the innovators of new game-changing technologies that can solve their biggest concerns. It certainly is wiser than simply taking advice handed down from lobbyists and relying on legislation that’s severely limited and unenforceable.
When the FCC uses its influence to investigate and embrace new and innovative technologies, they can finally make significant headway in restoring trust in the quality of service associated with our communications.
Jeff Pulver is an innovator in the field of Voice over Internet Protocol (VoIP). He was instrumental in changing how the FCC classified VoIP in 2004, paving the way for the development of video and voice internet communications. The co-founder of Vonage, Jeff has invested in over 400 start-ups.
Noah Rafalko is a pioneer in TNID (Telephone Number ID), a blockchain solution that restores trust in communications. Noah is founder and CEO of TSG Global, Inc. which provides voice, messaging and identity management services for SaaS companies and large enterprises. This piece is exclusive to Broadband Breakfast.
Broadband Breakfast accepts commentary from informed observers of the broadband scene. Please send pieces to firstname.lastname@example.org. The views reflected in Expert Opinion pieces do not necessarily reflect the views of Broadband Breakfast and Breakfast Media LLC.
- Tech Against Texas Social Media, Alabama Middle Mile Grant, IP3 Awards Bestowed
- State Broadband Maps Show Significantly Fewer Served Locations than Does FCC’s Map
- As LEO Industry Grows, FCC Adopts Rule to Limit Space Debris
- Shielding Broadband Grants from Taxes, American at ITU, Google Fiber Multi-Gig Speeds
- Public–Private Partnership Model ‘Most Effective Way’ to Address Digital Divide: AT&T Rep
- In Video Session, Christopher Mitchell Digs Into Community Ownership and Open Access Networks
Signup for Broadband Breakfast
Broadband Roundup4 weeks ago
AT&T Sues T-Mobile Over Ad, Nokia Partners with Ready, LightPath Expanding
Broadband Mapping & Data2 weeks ago
Broadband Mapping Masterclass on September 27, 2022
Broadband Mapping & Data3 weeks ago
FCC’s Fabric Challenge Process Important Part of Getting Map Right, Agency Says
WISP3 weeks ago
Wisper Internet CEO Takes Issue With Federal Government Preference for Fiber
Big Tech3 weeks ago
A White House Event, Biden Administration Seeks Regulation of Big Tech
Funding3 weeks ago
NTIA Middle Mile Director Stresses Need for Infrastructure to Withstand Climate Events
Fiber4 weeks ago
In ‘Office Hours’ Sessions, NTIA Addresses Questions of Middle Mile Grant Applicants
Broadband Roundup3 weeks ago
Cogent Buys T-Mobile Wireline, $81 Million from Emergency Connectivity Fund, Digital Redlining Study