Govt Report on Prevention of Nationwide Cyber Catastrophe

A good first step for sure, however there needs to be a government-wide decision on cyber attacks being an act of war and how to respond.

***

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:
  1. Reform the U.S. Government’s Structure and Organization for Cyberspace.
  2. Strengthen Norms and Non-Military Tools.
  3. Promote National Resilience.
  4. Reshape the Cyber Ecosystem.
  5. Operationalize Cybersecurity Collaboration with the Private Sector.
  6. Preserve and Employ the Military Instrument of National Power.

Click here to download the full report.

A much-anticipated government report aimed at defending the nation against cyber threats in the years to come opens with a bleak preview of what could happen if critical systems were brought down.

“The water in the Potomac still has that red tint from where the treatment plants upstream were hacked, their automated systems tricked into flushing out the wrong mix of chemicals,” the Cyberspace Solarium Commission wrote in the opening lines of its report.

“By comparison, the water in the Lincoln Memorial Reflecting Pool has a purple glint to it. They’ve pumped out the floodwaters that covered Washington’s low-lying areas after the region’s reservoirs were hit in a cascade of sensor hacks,” it continues.

So begins the report two years in the making from a congressionally mandated commission made up of lawmakers and top Trump administration officials, pointing to the vulnerabilities involved with critical systems being hooked up to the internet.

The report, which includes more than 75 recommendations for how to prevent the cyber doomsday it spells out, and the commission that made it were both mandated by the 2019 National Defense Authorization Act (NDAA).

The commissioners, who include co-chairmen Sen. Angus King (I-Maine) and Rep. Mike Gallagher (R-Wis.), highlight a range of issues to address, but zero in on election security as “priority.”

“The American people still do not have the assurance that our election systems are secure from foreign manipulation,” King and Gallagher wrote in the report. “If we don’t get election security right, deterrence will fail and future generations will look back with longing and regret on the once powerful American Republic and wonder how we screwed the whole thing up.”

The focus on shoring up election security, and the agreed-upon recommendations for how to do this, sets the report apart from the approach to the subject on Capitol Hill, where it has been a major issue of contention between Republicans and Democrats since Russian interference in the 2016 presidential election.

Beyond election security, the commissioners call for overarching government reform to address cyber vulnerabilities. Chief among these is calling on the White House to issue an updated national strategy to address cyber threats and to establish a national cybersecurity director position to coordinate efforts.

In terms of congressional action, commissioners recommend that Congress create cybersecurity committees in both the House and Senate, establish a Bureau of Cybersecurity Statistics, and establish an assistant secretary position at the State Department to lead international efforts around cybersecurity.

“While cyberspace has transformed the American economy and society, the government has not kept up,” commissioners wrote in calling for reforms.

The commission also zeroed in on “imposing costs” to adversaries who attempt to attack the U.S. online. In order to do so, it recommended that the Department of Defense conduct vulnerability assessments of its weapons systems, including nuclear control systems, and that it make cybersecurity preparedness a necessity.

The Cybersecurity and Infrastructure Security Agency, the Department of Homeland Security’s cyber agency, would be empowered as the “lead agency” at the federal level.

The report’s recommendations were debated on and pinpointed by a group of high-ranking commissioners who also included FBI Director Christopher Wray, Deputy Secretary of Defense David Norquist, Transportation Security Administration Administrator David Pekoske, Sen. Ben Sasse (R-Neb.), and Rep. James Langevin (D-R.I.).

Langevin said in a statement on Wednesday that the report is intended to shore up the nation’s cyber “resiliency for years to come.”

“Our charge in drafting this report was to prevent a cyber event of significant national consequence, and we know that the short- and long-term recommendations we crafted will better position us to realize the promise of the Internet, while avoiding its perils,” Langevin said. “The sooner our recommendations are implemented, the better positioned the country will be to prevent and respond to incidents that can disrupt the American way of life.”

The report’s recommendations may soon have real-world consequences on Capitol Hill.

Rep. John Katko (R-N.Y.), the ranking member on the House Homeland Security Committee’s cyber panel, told The Hill this week that there “definitely will be some legislation” stemming from the report’s recommendations, and that hearings would likely be held.

Katko noted that he had talked with Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) about the Senate also taking action around the report.

“This report screams of the need for bipartisan action on this, and I hope that we can leave the politics out of it, and I hope we can attack these problems quickly and effectively,” Katko said.

Rep. Cedric Richmond (D-La.), the cyber subcommittee’s chairman, opened a hearing on Wednesday by praising the report’s recommendations and saying he looked forward to working to “codifying” the ideas alongside House Homeland Security Committee Chairman Bennie Thompson (D-Miss.).

Industry groups also reacted positively to the report’s recommendations. Tom Gann, the chief public policy officer of cybersecurity firm McAfee, told The Hill in a statement that he agreed with most of the report’s findings and hoped that they are “acted upon with speed.”

Protect Our Power, a nonprofit with the goal of protecting the electric grid, also praised the report.

“These are compelling recommendations, echoing issues we have highlighted for several years now, and action is long overdue,” Jim Cunningham, executive director of the group, said in a statement. “Without a reliable supply of electricity before, during and following a disabling cyberattack, none of our critical infrastructure can function.”

While there may be legislative action soon – and praise from industry groups – both Gallagher and King emphasized in the report that their main aim was for it to open the eyes of Americans to the dangers posed by cyberattacks on critical systems.

“The status quo is inviting attacks on America every second of every day,” the co-chairmen wrote. “We all want that to stop. So please do us, and your fellow Americans, a favor. Read this report and then demand that your government and the private sector act with speed and agility to secure our cyber future.”

Taiwan More Advanced than U.S. to Deal with Coronavirus

Taiwan, while in a contentious government power struggle with China, the country has a very conservative approach on economic stability and encourages entrepreneurial strengths.

(Reuters) – China is pressuring Taiwan with “provocative” air force maneuvers near the island and spreading fake news to sow discord during the coronavirus outbreak, security sources and government officials in Taiwan say.

This sets the table for why Taiwan’s master plan to thrive during the coronavirus outbreak.

Angry Taiwan blames China for UN aviation meet snub | The ...

You can be assured corporate leaders in the United States are taking notice and are hosting some top level meetings regarding research and development across the country during this anxious time in America and across the world.

Taiwan records its first coronavirus death as global toll ...

Read on for some interesting actions Taiwan has taken given how interacted the country is with China.

***

Taiwan is 81 miles off the coast of mainland China and was expected to have the second highest number of cases of coronavirus disease 2019 (COVID-19) due to its proximity to and number of flights between China.1 The country has 23 million citizens of which 850 000 reside in and 404 000 work in China.2,3 In 2019, 2.71 million visitors from the mainland traveled to Taiwan.4 As such, Taiwan has been on constant alert and ready to act on epidemics arising from China ever since the severe acute respiratory syndrome (SARS) epidemic in 2003. Given the continual spread of COVID-19 around the world, understanding the action items that were implemented quickly in Taiwan and assessing the effectiveness of these actions in preventing a large-scale epidemic may be instructive for other countries.

COVID-19 occurred just before the Lunar New Year during which time millions of Chinese and Taiwanese were expected to travel for the holidays. Taiwan quickly mobilized and instituted specific approaches for case identification, containment, and resource allocation to protect the public health. Taiwan leveraged its national health insurance database and integrated it with its immigration and customs database to begin the creation of big data for analytics; it generated real-time alerts during a clinical visit based on travel history and clinical symptoms to aid case identification. It also used new technology, including QR code scanning and online reporting of travel history and health symptoms to classify travelers’ infectious risks based on flight origin and travel history in the past 14 days. Persons with low risk (no travel to level 3 alert areas) were sent a health declaration border pass via SMS (short message service) messaging to their phones for faster immigration clearance; those with higher risk (recent travel to level 3 alert areas) were quarantined at home and tracked through their mobile phone to ensure that they remained at home during the incubation period.

Moreover, Taiwan enhanced COVID-19 case finding by proactively seeking out patients with severe respiratory symptoms (based on information from the National Health Insurance [NHI] database) who had tested negative for influenza and retested them for COVID-19; 1 was found of 113 cases. The toll-free number 1922 served as a hotline for citizens to report suspicious symptoms or cases in themselves or others; as the disease progressed, this hotline has reached full capacity, so each major city was asked to create its own hotline as an alternative. It is not known how often this hotline has been used. The government addressed the issue of disease stigma and compassion for those affected by providing food, frequent health checks, and encouragement for those under quarantine. This rapid response included hundreds of action items (eTable in the Supplement).

Recognizing the Crisis

In 2004, the year after the SARS outbreak, the Taiwan government established the National Health Command Center (NHCC). The NHCC is part of a disaster management center that focuses on large-outbreak response and acts as the operational command point for direct communications among central, regional, and local authorities. The NHCC unified a central command system that includes the Central Epidemic Command Center (CECC), the Biological Pathogen Disaster Command Center, the Counter-Bioterrorism Command Center, and the Central Medical Emergency Operations Center.5

On December 31, 2019, when the World Health Organization was notified of pneumonia of unknown cause in Wuhan, China, Taiwanese officials began to board planes and assess passengers on direct flights from Wuhan for fever and pneumonia symptoms before passengers could deplane. As early as January 5, 2020, notification was expanded to include any individual who had traveled to Wuhan in the past 14 days and had a fever or symptoms of upper respiratory tract infection at the point of entry; suspected cases were screened for 26 viruses including SARS and Middle East respiratory syndrome (MERS). Passengers displaying symptoms of fever and coughing were quarantined at home and assessed whether medical attention at a hospital was necessary. On January 20, while sporadic cases were reported from China, the Taiwan Centers for Disease Control (CDC) officially activated the CECC for severe special infectious pneumonia under NHCC, with the minister of health and welfare as the designated commander. The CECC coordinated efforts by various ministries, including the ministries of transportation, economics, labor, and education and the Environmental Protection Administration, among others, in a comprehensive effort to counteract the emerging public health crisis.

Managing the Crisis

For the past 5 weeks (January 20-February 24), the CECC has rapidly produced and implemented a list of at least 124 action items (eTable in the Supplement) including border control from the air and sea, case identification (using new data and technology), quarantine of suspicious cases, proactive case finding, resource allocation (assessing and managing capacity), reassurance and education of the public while fighting misinformation, negotiation with other countries and regions, formulation of policies toward schools and childcare, and relief to businesses.

Border Control, Case Identification, and Containment

On January 27, the National Health Insurance Administration (NHIA) and the National Immigration Agency integrated patients’ past 14-day travel history with their NHI identification card data from the NHIA; this was accomplished in 1 day. Taiwan citizens’ household registration system and the foreigners’ entry card allowed the government to track individuals at high risk because of recent travel history in affected areas. Those identified as high risk (under home quarantine) were monitored electronically through their mobile phones. On January 30, the NHIA database was expanded to cover the past 14-day travel history for patients from China, Hong Kong, and Macau. On February 14, the Entry Quarantine System was launched, so travelers can complete the health declaration form by scanning a QR code that leads to an online form, either prior to departure from or upon arrival at a Taiwan airport. A mobile health declaration pass was then sent via SMS to phones using a local telecom operator, which allowed for faster immigration clearance for those with minimal risk. This system was created within a 72-hour period. On February 18, the government announced that all hospitals, clinics, and pharmacies in Taiwan would have access to patients’ travel histories.

Resource Allocation: Logistics and Operations

The CECC took an active role in resource allocation, including setting the price of masks and using government funds and military personnel to increase mask production. On January 20, the Taiwan CDC announced that the government had under its control a stockpile of 44 million surgical masks, 1.9 million N95 masks, and 1100 negative-pressure isolation rooms.

Communications and Politics
Reassure and Educate the Public, While Fighting Misinformation

In addition to daily press briefings by the minister of health and welfare the CECC, the vice president of Taiwan, a prominent epidemiologist, gave regular public service announcements broadcast from the office of the president and made available via the internet. These announcements included when and where to wear a mask, the importance of handwashing, and the danger of hoarding masks to prevent them from becoming unavailable to frontline health workers. The CECC also made plans to assist schools, businesses, and furloughed workers (eTable in the Supplement).

Taiwan’s Outcomes so Far (as of February 24)
Interim Outcomes

The CECC has communicated to the public in a clear and compassionate manner. Based on a poll of 1079 randomly selected people conducted by the Taiwan Public Opinion Foundation on February 17 and 18, the minister of health and welfare received approval ratings of more than 80% for his handling of the crisis, and the president and the premier received an overall approval rating of close to 70%. As of February 24, Taiwan has 30 cases of COVID-19. These cases represent the 10th-highest case number among countries affected thus far, but far fewer than the initial models predicting that Taiwan would have the second-highest importation risk.

Challenges

First, real-time public communications were mostly in Mandarin Chinese and sign language. Other than the Taiwan CDC website, there was not enough communication in different languages to non-Taiwanese citizens traveling or residing in Taiwan. Second, while its attention was focused on air travel, Taiwan permitted the docking of the Diamond Princess cruise ship and allowed passengers to disembark in Keelung, near New Taipei City, on January 31, before the ship left for Japan. The ship was subsequently found to have numerous confirmed infections onboard. This created a temporary public panic with concern about community spread. The government published the 50 locations where the cruise ship travelers may have visited and asked citizens who may have been in contact with the tour group to conduct symptom monitoring and self-quarantine if necessary. None were confirmed to have COVID-19 after 14 days had passed. Third, whether the intensive nature of these policies can be maintained until the end of the epidemic and continue to be well received by the public is unclear.

Conclusions

Taiwan’s government learned from its 2003 SARS experience and established a public health response mechanism for enabling rapid actions for the next crisis. Well-trained and experienced teams of officials were quick to recognize the crisis and activated emergency management structures to address the emerging outbreak.

In a crisis, governments often make difficult decisions under uncertainty and time constraints. These decisions must be both culturally appropriate and sensitive to the population. Through early recognition of the crisis, daily briefings to the public, and simple health messaging, the government was able to reassure the public by delivering timely, accurate, and transparent information regarding the evolving epidemic. Taiwan is an example of how a society can respond quickly to a crisis and protect the interests of its citizens.

Article Information

Corresponding Author: C. Jason Wang, MD, PhD, Stanford University, 117 Encina Commons, CHP/PCOR, Stanford, CA 94305 ([email protected]).

Published Online: March 3, 2020. doi:10.1001/jama.2020.3151

Conflict of Interest Disclosures: None reported.

References and footnotes found here in detail.

Operation Mega Flex

From July to September last year, Customs and Border Patrol in that 3 month period seized 1061 shipments of counterfeit goods at our cargo ports of entry. Items from Louis Vuitton bags to sports equipment with faulty parts. Other items included children’s toys, drug paraphernalia, deadly opioids, and really scary were (are) counterfeit drivers’ licenses. Recreational drugs, clothing, jewelry and even food and nutritional items (may contain toxins) are part of the counterfeit items affecting likely every American and business.

Image result for cbp counterfeit

Unlike legitimate drug manufacturers that are subject to inspections by the U.S. Food and Drug Administration, labs that manufacture counterfeits have no such oversight. According to a 2019 Better Business Bureau study, “companies based in China, Hong Kong, Singapore, and India shipped 97 percent of the counterfeit medicines seized in the U.S.”In March 2019, Europol, the European Union’s law enforcement agency, seized 13 million doses of counterfeit medicine ranging from opioids to heart medication. Europol noted that this type of counterfeiting is on the rise due to the relatively low risk of criminal detection.

Check those items in retail operations of all sorts and locations and what you purchase in the e-commerce realm, not the from the street vendor at the corner and when purchasing books, movies or music, you could be in real trouble for a transaction that violates copyright protected work.

Image result for cbp counterfeit

Watches and jewelry follow at 13 percent of total seizures. During the Mega Flex operation on August 21, 2019, for example, CBP officers seized counterfeit Rolex watches valued at over $1.4 million. Handbags and wallets represented nearly 11 percent of all seizures, including counterfeits of luxury brands such as Louis Vuitton, Michael Kors, and Gucci. Consumer electronicsrepresented 10 percent of seizures, including products such as iPhones, hover boards, earbuds, microchips, and others. Pharmaceuticals and personal care items account for only 7 percent of total seizures. However, as discussed in the next section, many of the products in these categories pose significant dangers to the consumer. Fake prescription drugs can lack active ingredients, contain incorrect dosages, or include dangerous additives. Fake personal care items such as cosmetics have been found to contain everything from harmful bacteria to human waste. Between 2017 and 2018, CBP and ICE Homeland Security Investigations (HSI) seized over $31 million in fake perfumes from China.

Law enforcement officials have uncovered intricate links between the sale of counterfeit goods and transnational organized crime. A study by the Better Business Bureau notes that the financial operations supporting counterfeit goods typically require central coordination, making these activities attractive for organized crime, with groups such as the Mafia and the Japanese Yakuza heavily involved. Criminal organizations use coerced and child labor to manufacture and sell counterfeit goods. In some cases, the proceeds from counterfeit sales may be supporting terrorism and dictatorships throughout the world.

In FY 2018, 12 percent of DHS seizures included counterfeit versions of critical technological components, automotive and aerospace parts, batteries, and machinery. Each of these industrial sectors have been identified as critical to the defense industrial base, and thus critical to national security. One example drawn from a 2018 study by the Bureau of Industry and Security within the Department of Commerce featured the import of counterfeit semiconductors or “Trojan chips” for use in defense manufacturing and operations. Such Trojan chips can carry viruses or malware that infiltrate and weaken American national security. The problem of counterfeit chips has become so pervasive that the Department of Defense has referred to it as an “invasion.” Companies from China are the primary producers of counterfeit electronics.

According to a 2019 report, Instagram and Counterfeiting, nearly 20 percent of the posts analyzed about fashion products on Instagram featured counterfeit or illicit products. More than 50,000 Instagram accounts were identified as promoting and selling counterfeits, a 171 percent increase from a prior 2016 analysis. Instagram’s Story feature, where content disappears in twenty-four hours, was singled out as particularly effective for counterfeit sellers.

For the full report, go here.

 

 

Justice Dept Brands Huawei as a Criminal Enterprise

Gotta hope that Europe takes note, especially Britain. Europe so far has approved Huawei as the vendor platform for 5G. Check your use of apps at the Google store and take a second look at your smart devices.

Image result for huawei source

FDD: The U.S. Department of Justice (DOJ) indicted Chinese telecommunications firm Huawei Technologies and its subsidiaries last week for alleged racketeering, theft of intellectual property, and conspiracy to commit bank fraud, among other charges. The indictment portrays Huawei not merely as a company that has broken the law, but as a fundamentally criminal enterprise.

The new charges target Huawei, four of Huawei’s subsidiaries (Huawei Device Co. Ltd., Huawei Device USA Inc., Futurewei Technologies Inc., and Skycom Tech Co. Ltd.), and Huawei’s chief financial officer, Meng Wanzhou, for violating the Racketeer Influenced and Corrupt Organizations (RICO) Act, which Congress passed in 1970 to combat organized crime.

According to the DOJ, the Huawei business model entailed “the deliberate and repeated misappropriation of intellectual property of companies headquartered or with offices in the United States.” DOJ also highlighted other violations, including Huawei’s role in sanctions evasion and fraudulent activities.

Last week’s indictment marks the first time DOJ charged a company with suspect connections to a foreign government as a criminal enterprise. Although Huawei asserts it is not state-owned, the company has indirect ties to the Chinese government and has yet to publically disclose who exactly owns and controls the company. Huawei’s majority shareholder is the company’s labor union, which keeps the details of its membership and governance structure out of the public eye. Last year, Jiang Xisheng, a top executive, explained during a press conference that the labor union’s ownership is simply a matter of legal convenience; this only further obfuscated who is really in charge. Additionally, Huawei’s founder, Ren Zhangfei, served in the Chinese military and is a member of the Chinese Communist Party.

While the indictment does not say that Beijing directed Huawei to operate as a criminal enterprise, China’s National Intelligence Law of 2017 requires Huawei and other private companies to provide the government with their data to “support, assist, and cooperate with state intelligence according to the law.” In short, the law empowers Beijing to exploit Huawei as an intelligence asset whenever it sees fit.

In other high-profile cases, the Chinese government has stolen sensitive U.S. data to achieve a strategic advantage. U.S. officials have even deemed China’s espionage and intelligence activities as a “long-term existential threat to the security of our nation.” In 2012, the head of the U.S. National Security Agency estimated that China’s economic espionage cost U.S. companies $250 billion in annual losses. Additionally, the targeting of strategic industries has allowed Beijing to enhance its own military capabilities at America’s expense.

The exploitation of Huawei could clearly enhance Beijing’s intelligence collecting capabilities. Just last week, the U.S. government reported that for over ten years Huawei secretly maintained “back doors” on its mobile networks that allowed the company – and potentially the Chinese government – to have direct access to their users’ most sensitive data.

The indictment of Huawei as a criminal enterprise shows that the Trump administration was mistaken when it placated Beijing by softening previous penalties for Huawei’s misconduct. If the court finds Huawei guilty under RICO, the administration should ensure the full application of all penalties necessary to end its criminal pursuits.

 

Iran to be Blacklisted as a Country

Financial Action Task Force, a Paris based organization will take blacklisting action on Iran this week. Finally, it appears Europe is joining the United States in this effort even while former Secretary of State John Kerry and a democrat U.S. Senate delegation met with Iranian leaders in a secret setting.
The task force designation will encompass 39 member countries and organizations where this calls for sanctions on Iran due to money-laundering, financing of terror organizations, corruption politicians, international crime, illegal arms trade and drug trafficking. It is unclear if the United Nations has offered any resistance or comment. The only other country under this full designation is North Korea, yet another 12 countries are subject to the same scrutiny and punitive actions by the task force. Banking and access to international trade will be limited or terminated in many cases completely.

Meanwhile, Russia and China have stepped in to provide more support and aid to Iran.
In an effort to preserve trade and revenue, Iran was construction a rail system into Central Asia connecting the Caspian countries of Azerbaijan, Kazakhstan, Azerbaijan, Russia, Kazakhstan and Turkmenistan. Due to US sanctions, Iran has been in a financial tailspin and construction has essentially stopped and the costs were escalating due to the difficult mountainous regions and regional politics. Enter China and Russia.

source

The project is expected to cost 1.2 billion euros ($1.5 billion) and is being financed by an export credit that Moscow has extended to Tehran. It will involve the electrification of 495 kilometers of existing line, including 203 kilometers in mountainous areas, and the updating of 31 stations and 95 tunnels. This railway segment is projected to carry up to ten million tons of cargo annually upon completion, in 2024. Russian and Iranian officials are jubilant: “All this creates conditions for the growth of goods traffic along the International North–South Transport Corridor and the intensification of economic ties in the Caspian region,” they say (Casp-geo.ru, February 18). The reasons are obvious: if this rail project is completed, Russia and Iran will be able to control much of the trade coming through or out of Central Asia, thus limiting the freedom of action of the states of that region and giving Moscow and Tehran a greater voice in Chinese decisions there (Casp-geo.ru, November 28, 2019; Ru.irna.ir, November 13, 2019).

***

Development of Xinjiang

For China, the project is extremely important due to several factors. First, it will stimulate the economic development of the Xinjiang Uygur Autonomous Region. This autonomous region of China plays a significant role in rail freight transportation on the New Silk Road. The majority of container trains from central, eastern and southern China to Europe run via Xinjiang. Its capital, Urumqi, is also an important railway hub on the corridor towards Europe.

Kashgar, one of the westernmost cities in China, could be another junction in Xinjiang. The Chinese government is discussing the construction of two railway lines from Kashgar: one westward to Kyrgyzstan and Uzbekistan, and another southward. The latter heads to Pakistan, where China Overseas Port Holding Company operates Gwadar Deep Sea Port, and where China intends to build its second, after Djibouti, overseas naval base.

New Silk Road

The second factor of success is the potential of the railway line for the New Silk Road. According to estimations, the Xinjiang – Kyrgyzstan – Uzbekistan route will shorten the route from China to Uzbekistan. Currently, containers going to this Central Asian country must cover long distances and cross the territory of neighbouring Kazakhstan.

Moreover, the railway link between China and Uzbekistan links to Iran (via Turkmenistan) and Turkey, as well as eventually to Europe, especially to Southeast Europe. With this, the route from China to Southeast Europe could be reduced up to 900 kilometres, equal to up to seven or eight days. At the same time, the new railway will allow China to better involve Kyrgyzstan and Uzbekistan into the New Silk Road.