Anatomy of an "Aggressive" Cybersecurity Measure by the Razorbacks

Where: Arkansas

The legislation: Senate Bill 632 (2019 | AR)

What does SB632 do?

  • Creates the Cyber Initiative
  • Housed within the Economic Development Commission
  • mitigate the cyber-risks to Arkansas
  • increase education relative to threats and defense
  • provide the public and private sectors with threat assessments and other intelligence
  • foster growth and development around tech, IT and defense
  • create a “cyber alliance” made up of partnerships with a variety of insitutitions like…

Regulatory TREND. What do I need to know about Active Cyber Defense?

Active Cyber Defense uses private sector cyber bounty hunters and hackers  to protect critical infrastructure.

Who is behind this concept?

  • An Atlantic Council report,
  • by, Frank Kramer, Assistant Secretary for International Security Affairs for the Clinton administration
  • and by, Bob Butler, Deputy Assistant Secretary for Space and Cyber in the Obama administration

How would this private sector system work?  the private sector hackser would be deputized  “certified active defenders” to assist…

Lege TREND. Robocalling is a felony under this bill + telecom requirements

Know those calls to your mobile that look suspiciously like a number you know? Arkansas SB 514 (2019 |AR) would change the penalty for those calls.

The bill would increase the penalty for spoofing from a Class B misdemeanor to a Class D felony. That’s up to 6 years in prison &  a fine up to $10,000.

Telecom companies would have to:

  • implement preventative measures
  • report yearly to the Arkansas Public Service Commission concerning steps taken to identify and block the robocall perpetrators

Ark…

3 Ways States Benefit from a State Data Officer.

 

  • data helps create more efficient permitting processes
    • CT allows local governments to get occupational licensing data directly form the state
  • overdose data helps first responders and hospitals prepare for epidemics
  • Prevent fraud 
    • IN adopted its Indiana’s Management and Performance Hub to “integrate” data from several agencies to build custom analytics solutions.” Its addressing issues from car crashes and infant mortality to Medicaid optimization.
    • TX shared data across agencies…

Lege TREND. Fake Constituent Written Suport.

The allegations of fake constitutent support:

  • Comments to the FCC over net nuetrality rules
  • Of 20 million comments, almost 50% were provided without consent

The investigations:

  • FBI issuing subpoenas
  •  New York Attorney General with support of Attorneys General of Massachusettes and the District of Columbia

Targets of the subpoenas:

  • 14 organizations
  • 11 of which are either politically conservative or related to the telecommunications industry and opposed net neutrality, and three of which…

Lege TREND. Define Cyber Events like Hurricanes or Terrorism. Read the bill.

The Nevada Legislature will consider SB69 (2019 | NV) which is:

  • backed by the Division of Public Safety’s Division of Emergency Management
  • defines significant cyber events like invasions, disasters and riots
  • require schools, cities, counties and resorts to have emergency response plans
  • designates October as “Cybersecurity Awareness Month”
  • allows the governor to call on the national guard during a significant cyber event

Nevada Independent | New pre-filed bills take aim at education,…

Refreshing our Recollection | Internet Bill of Rights | Hello, Telecom: Hint, Hint: This is where the left & right meet.

Activists are promoting an Internet bIll of Rights, the kind of bill state legislatures love. What would it do?

  • Keeping your “browsing history” private
    • ​Except: fraud or potential crimes  
  • Full disclosure when being monitored, and the right to opt out
  • Preserving the privacy of your social media accounts.
  • Ownership of your personal, digital content
  • Notification of injurious data breaches
  • Fair play on social media platforms and/or internet providers
  • Protecting children on social media
  • P…

5 Points. Apple Desired Information Privacy Law.

 

  • tech companies should de-identify customer data or not collect customer data
  • comprehensive federal law is necessary
    • why? tech companies that collect a lot of data are basically spies
  • people should have a right in their data, and a right to have that data minimized
  • consumers must be told what data is being collected & why
  • the data belongs to the users and users (consumers) should always have access to it

The gold standard law: GDPR in the EU

Ars Technica | Tim Cook Calls for Strong US…