General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region Forums#ALERT Tomorrow Trump will be signing a 'Cyber Security' Executive Order. But here it is today. UR w
Last edited Tue Jan 31, 2017, 12:21 AM - Edit history (1)
#ALERT Tomorrow Trump will be signing a 'Cyber Security' Executive Order. But here it is today. UR welcome (PDF) http://bit.ly/2klaNHm
Link to tweet
?ref_srctwsrc%5Etfw
Link to tweet
?ref_srctwsrc%5Etfw
Link to tweet
?ref_srctwsrc%5Etfw
PDF:
https://assets.documentcloud.org/documents/3424611/Read-the-Trump-administration-s-draft-of-the.pdf
EDIT:
President Donald Trump is expected to sign an executive order on cyber security on Tuesday, a source familiar with the situation said, marking the first action to address what he has called a top priority of his administration.
The order is expected to commission several different reviews of the governments offensive and defensive cyber capabilities, according to two other sources briefed on a draft of the order that circulated last week.
http://www.rawstory.com/2017/01/trump-expected-to-sign-cyber-security-executive-order-tuesday-source/
Ms. Toad
(34,076 posts)still using insecure androids & private servers.
Farmgirl1961
(1,493 posts)Foo Fighter
(743 posts)I posted them in post 15 on this thread but will repeat them here.
For Internet privacy:
Tor browser: https://www.torproject.org/projects/torbrowser.html.en
Tails OS: https://tails.boum.org/
Sorry but can't help much with the cell phones. I would need to look into it but don't really have the time ATM.
Bottom line: anything that's accessible via the Internet can be hacked. Anything.
Ms. Toad
(34,076 posts)I just think their actions since election suggest they were tossing aroung big words they didn't understand - so it is kind of laughable that they are tossing around even more words they don't understand, while engaging in at least as risky - if not more - behavior than they accused Clinton of.
Cha
(297,323 posts)Madam45for2923
(7,178 posts)Cha
(297,323 posts)Rex
(65,616 posts)That will be declaring war on a lot of deep, dark holes in Cyberspace.
Equinox Moon
(6,344 posts)...all the while he will be on TV 8pm announcing his SCOTUS pick.
I would bet we will put a damper on his parade.
cynatnite
(31,011 posts)Ms. Toad
(34,076 posts)but I think it's aimed at making sure we're training enough folks with the kind of skills needed for cyber defense/offense.
In a quick read, I don't think it was oversight.
cynatnite
(31,011 posts)Barack_America
(28,876 posts)...what's the deal with the secretary of defense and dept of education?
xor
(1,204 posts)(d) Workforce Development Review. In order to ensure that the United States has a long-term cyber capability advantage, the Secretary of Defense and Secretary of Homeland Security shall also gather and review information from the Department of Education regarding computer science. mathematics, and cyber security education from primary through higher education to understand the full scope of U.S. efforts to educate and train the workforce of the future. The Secretary of Defense shall make recommendations as he sees fit in order to best position the U.S. educational system to maintain its competitive advantage into the future.
janx
(24,128 posts)Aw hell nah. Hell nah!
Madam45for2923
(7,178 posts)janx
(24,128 posts)placing the Sec. of Defense in charge of some kind of higher ed "workforce" is crazy.
northoftheborder
(7,572 posts)milestogo
(16,829 posts)and then internet access.
That's what countries with dictators do.
Foo Fighter
(743 posts)(Note: any typos in the following are mine. When in doubt, look at the pdf.)
The Capabilities Review's recommendations shall include steps to insure that the responsible agencies are appropriately organized, tasked and resources, and provided with adequate legal authority necessary to fulfill their missions.
(bold is mine)
OK, that can't be good. Then we have this:
Section 8: Private infrastructure incentives report
(i) Preparation of a Report on options to incentivize private sector adoption of effective cyber security measures...
Section 8 (c) also discusses inducing private sector owners and operators to "adopt best practices with respect to processes and technologies necessary for the increased sharing of and response to real-time cyber threat information.", among other things.
(again, bold is mine)
I interpret that as "we will give our buddies in the private sector loads of taxpayer dollars to install our spyware on their networks." What happens to those that refuse isn't addressed but given the track record of the current administration, my guess is that it wouldn't be good. That's also probably where the aforementioned "adequate legal authority" comes in.
Two things that may be helpful for those worried about internet privacy:
Tor browser: https://www.torproject.org/projects/torbrowser.html.en
Tails OS: https://tails.boum.org/
Algernon Moncrieff
(5,790 posts)At least he understands large group management and has some grasp of public policy.
xor
(1,204 posts)We'll compile all the information we have on adversaries and then have it somehow get out to the adversaries so they can adjust their tactics.
We'll also compile a list of all our weaknesses and then have those findings given to our adversaries.