Drudge Retort: The Other Side of the News
Wednesday, May 15, 2019

President Donald Trump has declared a national emergency to protect US computer networks from "foreign adversaries". The president signed an executive order which effectively bars US companies from using foreign telecoms believed to pose a security risk to the country.

Advertisement

More

Comments

Admin's note: Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed.

Mr Trump does not name any company specifically in the order.

Let me guess... it ain't Russian.

#1 | Posted by REDIAL at 2019-05-15 06:44 PM | Reply

Good. Time to build a fire Wall for our borders.
Won't happen because telcos, but it's nice to dream.

#2 | Posted by GOnoles92 at 2019-05-15 07:43 PM | Reply

You think we should build a Great Firewall of America, like China has?

I guess I shouldn't be surprised when right-wingers promote government censorship...

#3 | Posted by snoofy at 2019-05-15 07:57 PM | Reply

Not censorship related, but defense related.

#4 | Posted by GOnoles92 at 2019-05-15 08:27 PM | Reply

That's what China says too!

#5 | Posted by snoofy at 2019-05-15 08:28 PM | Reply

"Open tech borders!"

- SnoofyHans

#6 | Posted by SheepleSchism at 2019-05-15 11:37 PM | Reply | Funny: 1

It's almost like china has something on Trump and he delusionally thinks that forbidding the importation of tech will prevent them from releasing it.

#7 | Posted by Tor at 2019-05-15 11:49 PM | Reply

I smell a privatization scheme..

#8 | Posted by redlightrobot at 2019-05-16 12:35 AM | Reply

By time Trump gets done with our borders, there will be nothing worth protecting left within them.

#9 | Posted by NerfHerder at 2019-05-16 12:35 AM | Reply

Trump, an idiot that he is, is making sure that other countries will think twice or thrice before committing their designs to US chips, technology, manufacturing production or standards.

Nobody wants to be a hostage to a potential sociopath Maniac-in-Chief and his regime. He is weaponizing trade, dollar, interest rates, DOJ, DOE, space, and whatever he can lay his greedy grubby tyrannical hands on.

And once they decide on actively avoiding American technology and currency, it's game over. Decline of Rome happened along similar lines.

#10 | Posted by CutiePie at 2019-05-16 03:22 AM | Reply

Advertisement

Advertisement

"foreign adventures" to that Huwue place sound pretty nice. How much to get onboard? Reading....

#11 | Posted by HeliumRat at 2019-05-16 03:39 AM | Reply

He's serious about defending us from foreign hackers unless they are hacking our election system. In that case....bring it on. Treasonous piece of crap.

#12 | Posted by danni at 2019-05-16 06:38 AM | Reply

It should be intuitively obvious to the most casual observer that Russian hackers were active during the US Presidential election. I am certain Comey had greater influence on the unfortunate 2016 outcome than the Russians.

#13 | Posted by bayviking at 2019-05-16 07:32 AM | Reply

The guy using an unsecured phone thinks "the networks" need securing. He probably has Kaspersky "protecting" him

#14 | Posted by hatter5183 at 2019-05-16 09:31 AM | Reply

IT security is only as strong as the weakest link.

As far as weaknesses go in our IT security Humpy Trumpy is patient Zero. Remove him and our National Security would instantly improve.

Hillary and her bathroom server were more secure that twitty bird Trump.

#15 | Posted by donnerboy at 2019-05-16 10:03 AM | Reply

. I am certain Comey had greater influence on the unfortunate 2016 outcome than the Russians.

#13 | POSTED BY BAYVIKING

How can you you be "certain"?

We know what Comey did. We are still finding out what the Russians did (and are still doing).

Which elections offices in Florida did the Russians infiltrate and how much? We are just now finding out. And if one was Broward County how much influence can one county have???

Just a reminder.

Bush won Florida's electoral votes by a margin of only 537 votes out of almost six million cast and as a result became the president-elect.

And in this last election Florida's recount process was once again marred by accusations of incompetence, antiquated voting technology and even a ballot design issue that some Democrats believe cost them a Senate seat. Republicans and the president even suggested -- without evidence -- that voter fraud had been committed.

#16 | Posted by donnerboy at 2019-05-16 10:14 AM | Reply

There ware pros and cons to true government controlled "border" routers. I personally think the cons far outweigh the pros and they are a huge risk to free speech and other constitutional rights. That isn't to say our government doesn't have it's paws in every border router that exists for our networks today because I am 100% sure they do. The ones that exist today are controlled by private corporations.

What there needs to be is a consortium made from security team members from everyone that has routers connecting to foreign connections working with Federal Specialists to make concerted non-political best efforts to go after issues.

All that said I am totally in agreement that we should NOT be deploying Huawei equipment or certain other foreign equipment and software. I won't use Kaspersky either any more. Foreign totalitarian governments have far more control of their corporations than we do that is for sure and they all have their own agendas. Huawei COULD be just fine - but why would you risk it if you see China as a potential adversary?

#17 | Posted by GalaxiePete at 2019-05-16 11:12 AM | Reply

It's about time. There is no need for any modernized power to purchase their IT equipment from other nations. Any of them that do have a low opinion of IT security.

"Republicans and the president even suggested -- without evidence -- that voter fraud had been committed."

Ugh, it's so annoying when people just either forget or willfully make an incorrect statement just so they can try to make a point. There was plenty of circumstantial evidence, just like there was plenty of circumstantial evidence to believe Reps caused problems in other states. Ignoring reality doesn't make your point more valid.

#18 | Posted by humtake at 2019-05-16 12:12 PM | Reply

It's about time. There is no need for any modernized power to purchase their IT equipment from other nations. Any of them that do have a low opinion of IT security.
#18 | POSTED BY HUMTAKE

Find a decent IT hardware or software company that isn't international? From equipment to software, it's all pretty international at this point.

#19 | Posted by Sycophant at 2019-05-16 03:25 PM | Reply

Ugh, it's so annoying when people just either forget or willfully make an incorrect statement just so they can try to make a point. There was plenty of circumstantial evidence, just like there was plenty of circumstantial evidence to believe Reps caused problems in other states. Ignoring reality doesn't make your point more valid.

#18 | POSTED BY HUMTAKE

No, there was no circumstantial evidence.

In fact, the only evidence thus far has been that the Russians hacked voter databases and possibly more in Florida.

#20 | Posted by Sycophant at 2019-05-16 03:26 PM | Reply

17 | POSTED BY GALAXIEPETE

Always appreciate your insight on this topic

#21 | Posted by GOnoles92 at 2019-05-16 03:41 PM | Reply

"There is no need for any modernized power to purchase their IT equipment from other nations."

So what do you propose, Uncle Sam building his own routers?

Because you'll be hard pressed to find one with all the guts made in America.

#22 | Posted by snoofy at 2019-05-16 03:47 PM | Reply

There was plenty of circumstantial evidence, just like there was plenty of circumstantial evidence to believe Reps caused problems in other states. Ignoring reality doesn't make your point more valid.

#18 | POSTED BY HUMTAKE

Which I think is exactly what the Kremlin said!!

Turn of Fox News and read the report.

For your education:

From the Mueller report (which every American should read):

In the report: Pages 22 and 23
By the end of the 2016 U.S. election, the IRA had the ability to reach millions of U.S. persons through their social media accounts. Multiple IRA-controlled Facebook groups and Instagram accounts had hundreds of thousands of U.S. participants. IRA-controlled Twitter accounts separately had tens of thousands of followers, including multiple U.S. political figures who retweeted IRA-created content.

In the report: Page 46
By no later than April 12, 2016, the GRU had gained access to the DCCC computer network using the credentials stolen from a DCCC employee who had been successfully spear phished the week before. Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network.

In the report: Page 58
"In addition to targeting individuals involved in the Clinton Campaign, GRU officers also targeted individuals and entities involved in the administration of the elections. Victims included U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well as individuals who worked for those entities.

In the report: Page 59
Similarly, in November 2016, the GRU sent spear phishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election. The spear phishing emails contained an attached Word document coded with malicious software (commonly referred to as a Trojan) that permitted the GRU to access the infected computer. The FBI was separately responsible for this investigation. We understand the FBI believes that this operation enabled the GRU to gain access to the network of at least one Florida county government. The Office did not independently verify that belief and, as explained above, did not undertake the investigative steps that would have been necessary to do so.
apps.npr.org

Then there is this Intelligence assessment:

www.dni.gov

This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies.It covers the motivation and scope of Moscow's intentions regarding US elections and Moscow's use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations.

You won't find any of this on Fixed Gnus.

#23 | Posted by donnerboy at 2019-05-16 04:09 PM | Reply

You won't find any of this on Fixed Gnus.

#23 | POSTED BY DONNERBOY AT 2019-05-16 04:09 PM | REPLY

That wasn't in Barr's summary therefore it isn't real

#24 | Posted by hatter5183 at 2019-05-16 04:49 PM | Reply

60% of all Cybercrime are committed by a corporations own workers. Many are H1B's hired or contracted to work in America by corporations based in India, Russia or China. CEO's love the savings but not the real life bill when it comes due...

hbr.org
======================================

When security breaches make headlines, they tend to be about nefarious actors in another country or the catastrophic failure of technology. These kinds of stories are exciting to read and easier for the hacked company to admit to. But the reality is that no matter the size or the scope of a breach, usually it's caused by an action, or failure, of someone inside the company.

The role that insiders play in the vulnerability of all sizes of corporations is massive and growing. In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters involved malicious intent, and one-quarter involved inadvertent actors.

IBM Security research also found that health care, manufacturing, and financial services are the top three industries under attack, due to their personal data, intellectual property and physical inventory, and massive financial assets

#25 | Posted by Pegasus at 2019-05-16 07:58 PM | Reply

Comments are closed for this entry.

Home | Breaking News | Comments | User Blogs | Stats | Back Page | RSS Feed | RSS Spec | DMCA Compliance | Privacy | Copyright 2019 World Readable

Drudge Retort