• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Events
      • Coming Events
    • Podcasts
    • Radio
    • Television
    • Youtube
  • Publications
    • All Posts Archive
    • Articles
    • Books
    • Papers
    • Presentations
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
      • Some Congressional Testimonies
      • 9/2010: SPEECH Act Celebration
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / Political Islam / The U.S. Cyber Vulnerability Goes On

The U.S. Cyber Vulnerability Goes On

February 10, 2016 by Rachel Ehrenfeld

Is there anyone in the United States whose personal information has not been stolen, yet? Hard to tell. The government agencies seem slow in detecting such breaches, slower in reporting about them, and very slow in resolving problems arising from such thefts. 

Take today’s Internal Revenue Service’s  announcement of the latest breach. The agency said it will send notifications to those affected by last month’s breach into taxpayers’ accounts. According to the agency the hackers used “personal data stolen elsewhere outside the IRS.” Maybe. 

In 2010, the Obama administration, spent about $12 billion on cyber security, said the General Accounting report. And a good chunk of that was spent on employees. So it comes as no surprise that President Obama’s 2017 budget proposal of more than $19 billion for federal security programs includes the hiring of new personnel. Accordingly, the new Cybersecurity National Action Plan (CNAP), will be presided by a new federal chief information security officer and new hires. 

Earlier this week, in his testimony before the Senate Select Committee on Intelligence, Director of National Intelligence, James R. Clapper spoke of Russia’s and China’s “sophisticated cyber programs [and] ongoing economic espionage [and] Iran’s and North Korea’s continuing “cyber espionage as they enhance their attack capabilities.” He pointed out: “Non-state actors also pose cyber threats. ISIL has used cyber to its great advantage, not only for recruitment and propaganda but also to hack and release sensitive information about US military personnel. As a non-state actor, ISIL displays unprecedented online proficiency. Cybercriminals remain the most pervasive cyber threat to the US financial sector. They use cyber to conduct theft, extortion and other criminal activities.” 

If this wasn’t enough, Clapper noted that the use of the Internet of Things, “will connect tens of billions of new physical devices that could be exploited.”  

According to special assistant to the president and cybersecurity coordinator for the National Security Council, J. Michael Daniel, the government is “investing in the capability to do detection better through continuing to expand the Einstein program and the continuous diagnostics and monitoring program… [and in] agencies’ ability to respond to events and be more resilient,” he said. To do that the government is using an existing “ management framework in the form of the cybersecurity framework of standards and best practices ” However, according to a new GAO audit, Einstein, or National Cybersecurity Protection System (NCPS), which cost $6 billion to build and operate, “fails to detect 94 percent of current security threats.” 

Clearly, this administration has failed to protect the country, its economy and its people from sophisticated electronic threats from within and without. Increasing government budgets proved useless, as has the patching of old systems. Instead of hiring new employees to train on the job, the government should hire those who are cyber savvy.  Contractors who provide services to the government should be held responsible for securing their services.

The past seven years had seen our cyber vulnerabilities growing. Our civilian infrastructure, including the electric grid, transportation, communication, financial institutions, hospitals and all electronic devices are increasingly susceptible, as is our military.   

With no time to waste, cybersecurity should be a major topic in Presidential candidates’ debates. They should present their plans for building the adequate fences to prevent intrusion into our systems and protect us from growing cyber attacks. 

Filed Under: Political Islam

Primary Sidebar

ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Search ACD

Recent Appearances

[5/30/2023] The Michael Savage Show

[5/11/2023] The Shaun Thompson Show

[5/9/2023] Two Mike's: The Soros Agenda with Rachel Ehrenfeld

[4/18/2023] Dr. Carole’s Couch / Voice America

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...

Spotlight

quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise islamist incitement winning the cyberwar gps concepts and misconceptions libel tourism

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Hizb ut-Tahrir Canada Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims Norman Bailey Ontario Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2023 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.