Overnight Cybersecurity

OVERNIGHT CYBERSECURITY: Feds struggling in cyber fight

Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We’re here to connect the dots as leaders in government, policy and industry wrap their arms around cyberthreats. What lies ahead for Congress, the administration and the latest company under siege? Whether you’re a consumer, a techie or a D.C. lifer, we’re here to give you …

THE BIG STORIES:

–CAN THEY BE STOPPED? The main system used by the federal government to protect sensitive data from hacks has been plagued by delays and criticism that it is already outdated — months before it is even fully implemented. The “Einstein” system is intended to repel cyberattacks like the one revealed last week by the Office of Personnel Management (OPM) — a breach now believed to be the worst in the government’s history. Four million federal workers had sensitive data exposed in the hack, with that information now thought to be part of a Chinese database that could help Beijing steal American secrets. Critics say Einstein has been a multi-billion-dollar boondoggle that is diverting attention away from the security overhaul that is needed. “I’ve spoken to government agencies — it is frightening what I hear from them,” said Hitesh Sheth, CEO of Vectra, which helps companies monitor their networks. To read our full piece, check back in the morning.

{mosads}–IT’S NOT GETTING BETTER: President Obama wasn’t very reassuring about the government’s cyber defenses during a Monday press conference in Germany, where he is attending the G-7 summit of leading industrial nations. “This problem is not going to go away — it’s going to accelerate,” he said. “That means that we have to be nimble, as aggressive and as well-resourced as those who are trying to break into these systems.” But the government’s not there yet, Obama added. “Part of the problem is we’ve got very old systems,” the president explained. “What we are doing is going agency-by-agency and figuring out what can we fix with better practices and better computer hygiene by personnel, and where do we need new systems and new infrastructure in order to protect information.” To read our full piece, click here.

–THE LIST GROWS: Add the Army’s website to the list of the pro-Assad Syrian Electronic Army’s successful targets. Ars Technica reported that the group had left a message claiming that it was responsible for the attack. It also left a message that said “Your commanders admit they are training the people they have sent you to die fighting.” The Army acknowledged the intrusion and said it was working to resolve the issue. The Army.mil site was still unavailable Monday evening. To read our full piece, click here.

 

UPDATE ON CYBER POLICY:

–THE PLAYGROUND BULLY THEORY. Republican presidential hopeful Mike Huckabee forcefully called for President Obama to hack China in response to last week’s reveal that suspected Chinese hackers pilfered 4 million federal workers’ records. “The way you deal with a bully on the playground is to punch them in the face and put them on the ground because the only thing they respect is power,” Huckabee said.

What specifically does he suggest? “We should hack the cellphones of some prominent Communist party leaders, hack the bank accounts of intelligence officials, publicly humiliate Chinese families for political corruption, or wipe-out a few critical Chinese computer systems,” Huckabee said. To read our full story, click here.

 

LIGHTER CLICK:

–OH, THE IRONY. Chinese app Wi-Fi Skeleton Key is quickly becoming among the most popular ways for smartphone users to protect their data when logged onto Wi-Fi networks. The app lets users connect without using any login credentials, a requirement throughout the country. It’s raised $52 million in series A funding, and the company is valued at over $1 billion. Check out more at TechinAsia.

 

A LOOK AHEAD:

TUESDAY

–Techonomy holds an all-day tech policy conference, including a panel on cyber war moderated by The Hill’s Cory Bennett. Sens. Cory Booker (D-N.J.) and Deb Fischer (R-Neb.) will speak, as will FCC Commissioners Michael O’Rielly and Jessica Rosenworcel and FTC Commissioner Julie Brill.

–The Senate will continue debate on the National Defense Authorization Act, which would boost oversight of the U.S. Cyber Command.

WEDNESDAY

–Politico will hold an event on the future of campaign technology at noon.

–Microsoft will hold a TechFair open house  at 1 p.m.

FRIDAY

–The D.C. Circuit Court of Appeals is expected to rule on lawsuits to block the FCC’s net neutrality rules before they take effect Friday.

 

IN CASE YOU MISSED IT:

Links from our blog, The Hill, and around the Web.

All federal websites will support encrypted browsing by the end of 2016. (The Hill)

The NSA is taking steps to turn its massive collection of Americans’ phone records back on. (The Hill)

The Washington Post asks: “Can feds trust Uncle Sam with their personal information?”

People bought more drugs on the dark Web after Silk Road was taken down. (Motherboard)

Someone had fun with this headline: “Connected cows, cars and crockery prod chip mega mergers.” (Reuters)

The NSA surveillance debate has created a bipartisan civil liberties coalition of unlikely bedfellows. (Christian Science Monitor)

Upscale Italian food market Eataly confirmed a data breach. (Law360)

If you’d like to receive our newsletter in your inbox, please sign up here: http://goo.gl/KZ0b4A