By Alain Espinosa
According to the U.S. National Travel & Tourism Office, almost 73 million U.S. citizens traveled abroad in 2016. While most of us have adapted to the travel restrictions implemented by the Travel and Safety Administration (TSA), there is an often-overlooked facet to travel — protecting your privacy and data.
By Paul A. Ferrillo & Dr. Christophe Veltsos
Hi. We are back. We had hoped to delay this update at least one more year, but that turned out not to be possible as, early on in 2016, the ransomware plague affected large swaths of corporate America and the healthcare system. And things have gotten uglier over the past few months.
Companies and organizations of great notoriety suffered cyber attacks, like the recent hacks of the Democratic National Committee (DNC),(1) the alleged hack on The New York Times by unknown sources, and very powerful distributed denial of service attacks against the website of famed blogger, Brian Krebs; a French media company called OVH; and a top-level domain name server company called Dyn.(2)
By Susan Kahn and Kari Thompson
Around the globe, key players from the public sector, private industry and nonprofit sector are coming together as partners to find long-term solutions to the complex challenges of our rapidly changing world. These partnerships are addressing everything from U.S. infrastructure development to safe drinking water in developing countries. Gilbert Probst of the World Economic Forum has called collaboration “the paradigm of the 21st century.”
Why is the U.S. Government taking these steps now? Are these new policies in response to a specific terrorist threat or plot?
The U.S. Government is concerned about terrorists’ ongoing interest in targeting commercial aviation, including transportation hubs over the past two years, as evidenced by the 2015 airliner downing in Egypt, the 2016 attempted airliner downing in Somalia, and the 2016 armed attacks against airports in Brussels and Istanbul. Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in various consumer items.
By Sean Murphy
OKLAHOMA CITY (AP) — Oklahoma City police investigators worked to piece together why a man waited to gun down an airline employee outside Will Rogers World Airport on Tuesday in an ambush that forced hundreds of travelers to take shelter and prompted authorities to shut down the state’s busiest airport for hours.
Police later discovered the suspected shooter dead from an apparently self-inflicted gunshot wound inside a pickup truck in a parking garage near where they believe he waited, watching airport employees come and go before shooting and killing Michael Winchester, 52, a Southwest Airlines employee.
“We do believe this was a premeditated act against the victim,” said Oklahoma City Police Capt. Paco Balderrama. “This was not random, and obviously the investigation is ongoing in reference to the other details.”
The Department of Homeland Security (DHS) recently issued a set of “Strategic Principles for Securing the Internet of Things (IoT), Version 1.0.” These principles highlight approaches and suggested practices to fortify the security of the IoT and will equip stakeholders to make responsible and risk-based security decisions as they design, manufacture, and use Internet-connected devices and systems.
On July 26, 2016, the InfraGard Maryland Members Alliance (IMMA) co-hosted a full-day seminar at Garrett College with the Maryland Governor’s Faith-Based Community Outreach Initiative Office and the FBI. The seminar addressed threats to faith institutions and active shooter incidents.
The seminar drew nearly 100 attendees from West Virginia, Pennsylvania and Maryland. Other agency partnering representatives included Marvella Gray from the FBI’s Community Outreach Program and Jennifer Gray from the Governor’s office, who also emceed.
By Michael Liedtke
SAN FRANCISCO (AP) — Yahoo detected evidence that a hacker had broken into its computer network at least 18 months before launching an investigation that discovered personal information had been stolen from about 500 million user accounts.
The timeline outlined in a regulatory filing raises further questions about why it took Yahoo so long to realize the severity of its security breakdown. It also could provide Verizon Communications with reason to revise or terminate its $4.8 billion deal to buy Yahoo’s online services.
By Mike Corder
THE HAGUE, Netherlands (AP) — European Union police agency Europol on Nov. 30 blamed human error for a breach of its data security rules by a former staff member that reportedly led to dossiers containing information about terrorism investigations becoming visible online.
Dutch investigative television show Zembla reported that a Europol staffer — in a breach of the agency’s tight security rules — took dossiers home and copied them to a backup drive that was linked to the Internet.
By Talley Cross Philpy, InfraGardNCR VP-Communications
How is the U.S. government preparing for a cyberattack against the electric grid? What can be done to ameliorate the effects of a massive attack? On Friday, March 4, journalist Ted Koppel addressed these questions and many more to InfraGardNCR members gathered at Boeing’s Arlington, Va., auditorium. InfraGardNCR President Kristina Tanasichuk conducted the interview with Koppel, author of the best-selling book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath.
There isn’t universal agreement on whether a cyberattack on the electric grid could have a massive impact, since the grid is somewhat decentralized, and there are redundancies. The grid is also designed with some compensatory mechanisms in place. According to Koppel, the disagreement over attack impact has made the issue less urgent to the U.S. government, which he contended is reactive versus proactive, and focuses its efforts on fighting fires in the present. The media is similarly preoccupied with reporting unfolding dramas rather than potential ones, he said, as networks compete fiercely for viewers in the wake of the Internet and digital media explosion. Continue reading