You are here Cybersecurity
Submitted by Scott Cleland on Fri, 2021-04-23 12:17
https://dailycaller.com/2021/04/23/cleland-why-repeal-not-reform-section-230/
DAILY CALLER
CLELAND: Why Repeal Not Reform Section 230?
SCOTT CLELAND -- CONTRIBUTOR -- April 23, 2021 10:20 AM ET
Repeal of Section 230’s 1996 lawless Wild West Internet policy is inevitable because it is based on an immoral premise and has inflicted severe damage to America’s constitutional liberties, national security and economic prosperity.
Repeal vs. Reform
Repeal of Section 230 would serve America and Americans much better than reforms that perpetuate lawless U.S. Internet policy and guarantee Big Tech remains unaccountable and Americans remain unprotected online.
Repeal would affect a major national policy change, while reform incrementalism would preserve the online status quo.
Repeal would be a comprehensive and constitutional solution, while content moderation reforms are piecemeal solutions that carry constitutional risks.
Repeal would empower 2022 and 2024 voters with a national policy conversation that asks candidates if and how they are going to ensure Big Tech is accountable and Americans are protected online?
Submitted by Scott Cleland on Mon, 2018-02-05 11:39
SUMMARY
What could possibly go wrong with a nationalized, dual-use, military-civilian, secure 5G wireless network to centralize all military and civilian U.S. transportation traffic control and management with Alphabet-Google as the only commercial wireless ISP “financing/anchor tenant?” Way too much.
Submitted by Scott Cleland on Mon, 2016-11-28 16:11
Please don’t miss my latest Daily Caller op-ed: “How U.S. Internet Commons Policies Lessen Growth Jobs & Security.”
It spotlights how U.S. Internet commons policies – where “free” means a price of zero and “open” means no property -- create winner-take all economic outcomes for the Netstablishment at the expense of everyone else.
Submitted by Scott Cleland on Fri, 2015-12-11 16:41
Google is the ringleader thwarting the FBI’s high priority to make smartphones subject to the Communications Assistance to Law Enforcement Act, CALEA, like all other communications technologies were before smartphones, so that the FBI can continue to wiretap, investigate and thwart terrorism (ISIS etc.), and crime, like it routinely did prior to the smartphone era.
(Anyone that doubts Google is the de facto encryption ringleader, see the evidence here. And don’t miss the fourth segment of this analysis about how Google cleverly thwarted the FBI in lobbying for a de facto anti-CALEA, last-minute, change to the FCC’s Open Internet order.)
Submitted by Scott Cleland on Thu, 2015-11-19 13:07
Google is unique in its leadership, plans, and global marketpower to accelerate the majority of all global Web traffic “going dark,” i.e. encrypted by default. Google’s “going dark” leadership seriously threatens to neuter sovereign nations’ law-enforcement and intelligence capabilities to investigate and prevent terrorism and crime going forward.
Google is not the only U.S. Internet company endangering the national security of many countries by “going dark” via end-to-end corporate encryption in an environment of exceptional terrorist risk -- Apple has been self-servingly irresponsible as well.
Nevertheless, Google warrants the spotlight and primary focus here on “going dark” for three big reasons.
Submitted by Scott Cleland on Fri, 2015-09-11 17:24
Submitted by Scott Cleland on Tue, 2015-09-08 22:27
“Cyber systemic risk” is Internet-driven risk that threatens to destroy the business viability of industry ecosystems.
While cybersecurity risk may be the familiar and recognizable type of cyber systemic risk, it is only recognizable like the tip of an iceberg is recognizable, because most cyber systemic risk lurks well out of view, deep beneath the surface in the ocean of virtual ones and zeros.
“Cyber systemic risk” generally is the Internet version of the financial crisis’ hard lesson of “systemic risk,” where the world learned that risks or disruptions to one or a few financial institutions could cascade to become risks or disruptions to the broader financial ecosystem. That’s because the inherent inter-linkages and inter-dependencies of financial institutions’ debt and liquidity exposed the then underappreciated fragility of the interwoven financial system.
The financial crisis exposed the need and the requirement for corporations to be more vigilant concerning enterprise risk management (ERM). Consequently the next crisis exposing enterprise risk is less likely to happen from a replay of known financial systemic risks, but from new unappreciated or ignored cyber systemic risks.
Cyber systemic risk is arguably more serious than financial systemic risk. That’s because the Internet inherently is: the most inter-linked, inter-dependent, intermediary system ever created; an insecure and un-private system; and more centralized and concentrated at the top than the financial ecosystem.
Submitted by Scott Cleland on Mon, 2015-08-17 10:46
Please don’t miss my latest Daily Caller op-ed entitled “America’s Upside Down Cyber-Priorities.”
- It spotlights the national travesty of the government prioritizing net neutrality openness to the detriment of cybersecurity and a more secure Internet.
Submitted by Scott Cleland on Sun, 2014-09-07 21:51
While a well-positioned façade of a castle can create the illusion of a fully-fortified castle, real people’s data requires more than the illusion of security; it requires real data-protection-security.
Google’s outsize ability to create the illusion of data-protection-security is particularly apt given that Eran Feigenbaum is Google Apps Security Director by day, and also a professional magician/illusionist by night.
Submitted by Scott Cleland on Mon, 2014-08-04 11:18
Google-Android sacrifices users’ security, privacy and data protection to scale Android fastest so that Google can dominate mobile software and advertising.
This charge and analysis is timely and relevant because Reuters is reporting that European Commission competition authorities are “laying the groundwork for a case centered on whether Google abuses the 80 percent market share of its Android mobile operating system to promote services from maps to search.”
The purpose of this particular analysis is to help a user better understand how they are harmed by Google-Android’s disregard for data protection.
Pages
|