Lege TREND. 3 Ways Tech Companies Lobbying Against Data Privacy laws

 

  • Carving out exceptions to the  California Consumer Privacy Act
    • The message: “addressing workability issues from a business compliance standpoint, to strengthening the law from a consumer and privacy protection standpoint”
  • Coalition of business entities including:
    • Internet Association
    • TechNet
    • Consumer Technology Association
    • Chamber of Commerce
    • Large Tech Companies
    • Wireless Association,
  • Plausible Deniability
    • Tech Companies and associations are not attending technical…

Lege TREND. Anatomy of an election security bill

Where: Georgia

The legislation: HB 392 (2019 | GA) 

What would this bill require:

  • the state Secretary of State
  • required to create security protocols for voter registration information
  • follow and be consistent with standards set by national cybersecurity and election organizations

Atlanta Journal Constitution | New safeguards for Georgia election security await Kemp’s signature

Lege TREND. Election Hacking. Low Rates of Voting in a Specific Statewide Race.

Georgia uses exclusively paperless ballots. The November 2018 election produced high numbers of people not voting for Lt. Governor.

A lawsuit seeks to invalidate that race due to the low voting numbers in that specific race and calling for forensic examination of the electronic voting machines.

Politico | Another Georgia voting kerfuffle

Campaign TREND. Tea Party Call Lists. Pro Gun Protest Agendas and Scripts unprotected data.

What data was exposed? Tea Party Patriots campaign materials, call lists, guidelines for national student led pro-2nd amendment protests, including toolkits for protests

How was it exposed? Left unpassword protected on an Amazon S3 storage bucket

Who found it?UpGuard, a California-based “cyber resiliency” firm renowned for locating confidential records inadvertently exposed online

Gizmodo | Tea Party Group Leaks Call Lists, Guides for Staging Pro-Gun ‘Student-Led’ High School Protests

#1 Way to Avoid Election Hackers. Procurement Opportunities..

A newly report titled “Email and Internet Voting: The Overlooked Threat to Election Security.” It’s a collaboration between the National Election Defense Coalition, the Association for Computing Machinery, R Street and Common Cause lists this as the best way to protect elections:

paper ballots

Politico | HIGH-TECH, LOW SECURITY

 

Campaign TREND. Cybersecurity. Golden State Governor Race.

Both candidates set forth cybersecurity plans that will:

  • train more cybersecurity professionals
    •  including 5,000 new female and minority cybersecurity professionals by 2021
  • secure consumer’s private data
  • protect Colorado as a place to do business

 

Colorado Sun | Colorado’s candidates for governor offer a first glimpse into the importance they will place on cybersecurity

Anatomy of a Cyber Security Caucus

The Congressional CyberSecurity Caucus:

Co-Chairs:   Michael McCaul & Jim Langevin

Members: 

Aguilar, Pete, California, 31st
Allen, Rick A., Georgia, 12th
Barton, Joe, Texas, 6th
Bishop, Mike, Michigan, 8th
Blum, Rod, Iowa, 1st
Brooks, Mo, Alabama, 5th
Bustos, Cheri, Illinois, 17th
Capuano, Michael, Massachusetts, 7th
Carbajal, Salud, California, 20th
Cárdenas, Tony, California, 29th
Castro, Joaquin, Texas, 20th
Chabot, Steve, Ohio, 1st
Cicilline, David, Rhode Island, 1st 
Clarke, Yvette D., New York,…

Campaign TREND. Not Spending Funds on Cyber Security. 3 Key Points.

  • 6 candidates for U.S. House &  Senate spent more than $1,000 on cybersecurity
  • why? campaigning takes too much time to address cybersecurity issues ro raise funds for cyber security technology protections
  • what do recent hacks look like?
    • Senator McCaskill says her campaign was hacked
    • Hacking in 2 California House races are being investigated by the FBI
    • Silverlining: 2 major parties spend heavily on cyber security protections

Government Technology | Despite Mounting Threats,…

Campaign Trend. Devices and Campaigns. What's preferred?

Campaign entity: The DNC

The data device policy:  Eliminate Android, espcially ZTE devices. Retain iphones.

Is there a campaign officer for security? Yes, chief information security officer, the former chief information security officer at Yahoo

Forbes | Democrat Cyber Defenders Are Purging Androids In Favor Of iPhones