• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Cyber Insecurity National Reminder

Cyber Insecurity National Reminder

October 7, 2014 by Rachel Ehrenfeld

As in previous years, the President proclaimed October, the “National Cybersecurity Awareness Month.” Yet, the nation’s growing cyber vulnerabilities attest that six years into the job, he has little to show but hollow statements.

Our growing cyber vulnerabilities manifest that one month of national awareness a year has done little to alert Americans to the tremendous vulnerabilities of cyber systems used by the government, businesses, and social media.

On October 5, on ”60 Minutes,” the Director of the Federal Bureau of Investigation (FBI) James Comey, all but gave up to China’s massive hacking that causes untold billions of dollars in damages to the U.S. economy.

“There are two kinds of big companies in the United States,” he said. “There are those who’ve been hacked by the Chinese, and those who don’t know they’ve been hacked by the Chinese.”

But the Chinese are not alone. Nor does hacking end with banks and the financial industry. In March the computers of the U.S. government’s Office of Personnel Management were compromised. Last July the database of the contractor that does background security investigations for the Department of Homeland Security (DHS) was breached.

Yet, the President and Congress have failed to create a legal framework to allow the private sector actions that would strengthen our mostly defenseless cyber systems.

The Department of Homeland Security complains that budget cuts do not allow the hiring of top cybersecurity experts. What is JPMorgan Chase’s excuse?

The October 2nd regulatory filing by JPMorgan Chase, following earlier news of the bank’s hacking, revealed that 76 million “households” and 7 million small businesses were affected. Since a “household” may have more than one account holder, and “small business” involves unknown numbers of clients and suppliers, the real figure of those affected is surely much larger.

The bank gives assurances that there is “no evidence” that their customers’ “account information, account numbers, passwords, user IDs, dates of birth or Social Security numbers” were compromised. However, the hacking went on for some three months before the bank noticed something was wrong.

According to Bloomberg, the hacker(s) exploited a defect in one of the bank’s websites that “unleashed malicious programs designed to penetrate the corporate network…the intruders reached deep into the bank’s infrastructure, siphoning gigabytes of information.” This includes names, addresses, phone numbers, email addresses, as well as credit cards, and investments of more than 83 million customers, as well as an unknown number of the bank’s former account holders.

Despite the huge loss suffered by U.S. businesses, there is a strange reluctance to invest in cyber defense in the absence of government leadership.  Such an attitude is common not only among U.S. businesses. Earlier this week, PwC together with CIO and CSO magazines released the “Global State of Information Security Survey 2015,” which surveyed some “10,000 executives and IT, directors in 154 countries… [and] reveals that global corporate security budgets have fallen at a time when cybersecurity breaches are rising dramatically. Of even greater concern is the fact that corporate boardrooms seem determined to adopt ostrich-like behavior and ignore the problem.”

This, despite innovative cybersecurity technology that has been already developed by American scientists at national laboratories, with American taxpayers’ money. Last month, Sandia National Laboratories in Albuquerque announced a new partnership with the Department of Homeland Security. Sandia will use its innovative testing technology to assist with DHS Transition to Practice (TTP) program to help move federally funded cybersecurity technology over the government’s bureaucracy (aka “valley of death”) into broader use,

In 2012, Los Alamos National Laboratory has announced the development of a “revolutionary technology entitled “QKarD” that implements the quantum mechanical laws of physics rather than complex mathematical problems to encrypt information.”  A year later, the portable, wireless, easy to use QKarD Quantum Smart Card was announced.

The Card can be used to secure data and communication in electric grids, wireless communication and Internet, banking, and much more.  The group that developed the technology has obtained private funding to commercialize it, but apparently, not to advertise it. Otherwise, it would be reasonable to assume that the President would have boasted about this homegrown innovation, or at least order DHS to use it to better secure the country’s critical infrastructure.

Similarly, innovative technologies to counter cyber and other attacks have been developed, but without redundancy, the move to wireless technologies seems to have weakened our ability to withstand a massive cyberattack that could devastate the country’s economy and jeopardize the U.S. national security.

Clearly, one month of national awareness a year is not enough.

Filed Under: ACD/EWI Blog, Cyber, Cyber security, Latest News, Purposeful Interference, U.S. Policy

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.