CTT Co-Founder Roslyn Layton: Government Accountability Office Report: DoD Cybersecurity Through the COVID-19 Crisis – Part 1

Part 2 of Dr. Layton’s blog will be published on Thursday, April 23. Please check back on that date for more information on the GAO report regarding DOD cyber security. An estimated 90 percent of cyberattacks to Department of Defense and armed forces could be avoided by its users practiced good “cyber hygiene”, the equivalent to washing your hands for computer systems, according to DOD’s Principal Cyber Advisor.[1] Its new report by the General Accountability Office (GAO)  Cybersecurity: DOD Needs to Take Decisive Actions to Improve Cyber Hygiene explains that the Department of Defense (DoD) has failed to implement its own cyber initiatives on culture, discipline, and awareness from 2015 despite have the time and budget to do so.  The… Read More

Governing: State and Local Governments Expected to Spend a Record $111 Billion on Technology in 2020

Recently Governing magazine reported on the Beyond the Beltway event in Washington, D.C., where technology industry executives heard from government chief information officers regarding major tech investments that cities, counties, and states are expected to make in the coming year. The Center for Digital Government’s Vice President of Research Joe Morris emphasized cybersecurity as a top priority for local government IT spending, and pointed to the potential of long-term financial consequences for governments that fail to commit to increased cybersecurity spending. The article remarks:  “Citing the rise of ransomware attacks over the past year, as well as the increasing dollar amounts of ransomware demands, Morris noted that real financial consequences above and beyond ransoms are also starting to emerge. Financial… Read More

10 Reports on Chinese cyber practices

China Tech Threat recommends the following reports from experts, think tanks, and government agencies that carefully outline the scope and threat from Chinese cyberattacks and cyber theft. The New Cyber Insecurity: Geopolitical and Supply Chain Risks From the Huawei Monoculture, Recorded Future, June 2019 “Huawei does not just exist within an authoritarian state with a one-party system; as a company, it has benefitted from that system, supported that repressive rule, and is intertwined with the success of that government’s policies.” How Chinese Companies Facilitate Technology Transfer from the United States, U.S.-China Economic and Security Review Commission, May 6, 2019 The Chinese government has utilized coordinated, government-backed cyber espionage campaigns to steal information from a variety of U.S.-based commercial firms, including… Read More

U.S. Policy Catches Up With Reality

This month, the Trump Administration took two significant steps to protect U.S. telecommunication networks and supply chains from being compromised by intrusions and backdoors facilitated by Chinese technology companies. Last week, the FCC voted 5-0 to prevent China Mobile’s request to enter the U.S. market.  “The Chinese government could use China Mobile to exploit our telephone network to increase intelligence collection against U.S. government agencies and other sensitive targets that depend on this network,” said FCC Chairman Ajit Pai said. “That is a flatly unacceptable risk.”   As a state owned enterprise (SOE) – the Chinese government owns somewhere between 73 and 100 percent of the company – China Mobile would be subject to the country’s intelligence collection and surveillance policies,… Read More