Page 24 - AT
P. 24

A24    TECHNOLOGY
                   Monday 13 January 2020
            AP Explains:  Not all cyber threats equally worrisome




            By ERIC TUCKER                                                                                                      and  governments  have  to
            Associated Press                                                                                                    confront  is,  "Do  you  have
            WASHINGTON (AP) — West                                                                                              evidence  that  your  sys-
            Virginia  reported  unusual                                                                                         tem was breached? That's
            cyber  activity  targeting  its                                                                                     what  you're  really  worried
            election systems. The Texas                                                                                         about."
            governor said the state was                                                                                         The tactic is also significant-
            encountering    attempted                                                                                           ly more subtle than pinging
            "attacks"  at  the  rate  of                                                                                        a network, and thus often a
            "about  10,000  per  minute"                                                                                        preferred technique for so-
            from Iran. Information tech-                                                                                        phisticated  hackers  loath
            nology  staff  in  Las  Vegas                                                                                       to raise alarms.
            responded  to  an  intrusion,                                                                                       "If your attempt is to try to
            though  the  city  says  no                                                                                         compromise  an  organiza-
            data was stolen.                                                                                                    tion, you probably want to
            All told, state election offi-                                                                                      be a little more surreptitious
            cials in at least two dozen                                                                                         about it," McNamara said.
            states saw suspicious cyber                                                                                         ___
            activity last week, although                                                                                        THE THREAT TO PUBLIC CON-
            it's unclear who was behind                                                                                         FIDENCE
            the  efforts  and  no  major                                                                                        Practically speaking, there's
            problems were reported.                                                                                             a  big  difference  between
            Long  before  a  targeted                                                                                           scanning  a  network  for
            U.S.  strike  killed  a  top  Ira-  This Saturday, Oct. 7, 2017, file photo shows a polling place at Southside Elementary in Huntington,   vulnerabilities and actually
            nian  general,  there  were   W.Va.                                                                Associated Press   breaking into it and extract-
            already  concerns  about                                                                                            ing  sensitive  information.
            foreign  efforts  to  hack  common.  In  fact,  federal   place or that they've been  networks  of  major  Ameri-   But experts say even scans
            American  institutions  and  officials  believe  election   compromised," he added.    can    corporations   and  may  nonetheless  benefit
            elections. The conflict with  systems in all 50 states were   ___                      stealing their trade secrets,  Russia, or any other country
            Iran has only exacerbated  probably  targeted  during     THE THREAT OF SPEARPHISH-    and  with  Russian  hackers  looking  to  undermine  faith
            those fears.                 the  2016  election,  though   ING                        who stole emails belonging  in  elections,  particularly  if
            Yet as the recent spate of  the  number  of  known        Experts  say  many  major  to  the  Hillary  Clinton  cam-  unschooled  officials  sound
            reports makes clear, not all  breaches  —  including  in   hacks  originate  not  with  paign during the 2016 presi-  unwarranted  alarms.  The
            suspicious  cyber  activities  Illinois  and  a  couple  of   network  scans  but  with  dential election.          American  public  may  not
            are  equally  troublesome,  counties  in  Florida  —  was   spearphishing  emails  —  "That might be evidence of  appreciate  the  distinction
            the work of a foreign gov-   significantly  more  modest.   messages  that  appear  le-  a  more  targeted  effort.  It  between   activities   that
            ernment  or  a  precursor  to  A Senate intelligence com-  gitimate  but  that  actually  may be that one of those is  may  be  fairly  routine  and
            the type of Russian interfer-  mittee  report  said  it  found   launch  malicious  software  going to get through, and  full-blown cyberattacks.
            ence seen in the 2016 elec-  no  evidence  that  votes  or   that,  once  opened,  can  all  you  need  is  one,"  said  "I  believe  that  one  of  Rus-
            tion on behalf of President  voting  registration  systems   give  an  intruder  access  to  Suzanne Spaulding, former  sia's objects is to undermine
            Donald  Trump.A  look  at  were altered.                  the network or trick a target  under secretary for the Na-  public  confidence  in  the
            what kinds of cyber activi-  IS  THE  ACTIVITY  WORRI-    into  unwittingly  surrender-  tional  Protection  and  Pro-  legitimacy of the outcome
            ties  are  worrisome  —  and  SOME?                       ing a network password.      grams  Directorate  at  the  just as a way of weakening
            what are not:                It  can  be,  to  the  extent   It was a ploy used by Chi-  Department  of  Homeland  us,"  said  Spaulding,  now  a
            WHAT SORT OF ACTIVITY IS  that it demonstrates that a     nese  hackers  charged  by  Security.                     senior adviser at the Center
            THIS?                        hacker has set his sights on   the  Justice  Department  in  She said the first big ques-  for  Strategic  and  Interna-
            Generally  speaking,  what  exploring  —  and  possibly   2014 with hacking into the  tion    that   organizations  tional Studies.q
            the  states  are  reporting  returning to — a particular
            are  efforts  to  probe  their  network, and especially if a   Detroit nonprofit to hold free
            networks  for  vulnerabilities,  target  is  part  of  the  coun-
            be  exploited  for  potential  Much  depends  as  well  programs on cybersecurity
            or  weaknesses  that  can  try's critical infrastructure.
            intrusion.  "Think  of  it  in  the  on  the  volume  and  fre-
            real  world  as  a  bank  rob-  quency,  since  repeated,   DETROIT (AP) — A Detroit-  Registration is required.   ties  to  learn  about  tech-
            ber  walking  by  a  bank  —  unwanted  contact  with  a    based  nonprofit  focused  “Science  fiction  movies  nology, programming and
            first  thing  they're  going  to  website can overwhelm an   on technology education  have always portrayed fu-    cybersecurity games.
            do is case the joint, and the  internet-connected  server,   and  workforce  develop-  ture emerging technology  Participants  must  regis-
            same thing happens in the  effectively shutting it down     ment  training  will  present  and activities long before  ter for access to practice
            digital  space,"  said  former  in  what  is  known  as  a  dis-  two free events about cy-  the  technology  occurred  competition software.
            FBI  agent  Anthony  Ferran-  tributed  denial  of  service,   bersecurity.            in  real  life,”  Byrd-Hill  said.  “Cybersecurity   special-
            te,  who  served  as  director  or DDoS attack.             The drama “Blackhat” will  “Sometimes, movies have  ists  must  understand  how
            for cyber incident response  In general, though, when it    be  shown  Saturday  after-  portrayed the technology  to  engineer  the  internet
            at  the  White  House's  Na-  comes to poking around a      noon at the Wilder library  30-plus years in advance.  and  computer  networks
            tional Security Council.     network,  "I  would  certainly   branch  and  Monday  at  This is where society is go-  to stop cyber hackers and
            The  culprits  are  doing  the  put it in a less severe cate-  the  Redford  branch  as  ing and why you need to  attackers,”  Byrd-Hill  said.
            cyber  equivalent  of  wig-  gory of threat activity than,   part  of  Uplift  Inc.’s  Future  be prepared for it.”  “Many  companies  and
            gling a doorknob, said Fer-  say, an intrusion," said Luke   Tech in Movies series, ac-  Video gamers also are in-  government      agencies
            rante, the global leader of  McNamara, a principal an-      cording  to  Ida  Byrd-Hill,  vited to take part in Uplift’s  utilize video game perfor-
            the  cybersecurity  practice  alyst at FireEye, a cyberse-  the  organization’s  presi-  Game  Workz  series  that  mance  to  select  employ-
            at FTI Consulting.           curity firm.                   dent.  Byrd-Hill  will  lead  a  starts Jan. 25 at the Wilder  ees.”
            Scanning  for  network  vul-  It's "certainly not evidence   discussion  on  cybersecu-  library  branch.  The  pro-  Both  programs  are  de-
            nerabilities  is  remarkably  that an intrusion has taken   rity during each showing.  gram  features  opportuni-  signed for adults.q
   19   20   21   22   23   24   25   26   27   28   29