Capella University: Unit 1 Technology Innovations and Security Breaches 2010-2017: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

10-15-2017
Unit 1 Capella University Final
From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
Technology and Security Breaches: 2010

1) Communication Technology: Square (Collect Banking Credit Card For Payment):
There might not be a piece of tech more due for an update than the cash register. Enter Square, a payment platform created by Twitter co-founder Jack Dorsey. With the aid of a tiny magnetic card reader that attaches to a smart phone, Square lets anyone process credit cards. It might not do away with paper entirely — plenty of people still prefer cash — but you certainly don't need to wait for a receipt: sign on the screen, and Square sends a copy straight to e-mail. (Fletcher, 2010)

2) Related: Security Breach: Citigroup Bank (Banking Information Breach)
            A) Lincoln National Financial Securities: Password management of  accounts
             breach:
Not only did Lincoln National mistakenly print a username and password in a brochure posted on a public website, but it let employees and affiliates share usernames and passwords. Unfortunately, those credentials belonged to a portfolio information system housing data for 1.2 million customers. (Phifer, 2011).
                 B) CitiGroup: Human Error/Fraud:
Ultimately, many breaches are still the result of human over-sight or error. Even though these SSNs were printed in a way that resembled mail routing numbers and may not have resulted in actual identity thefts, this shows how even a highly-regulated company with rigorous data handling processes can still shoot itself in the foot in a fairly big way (Phifer, 2011).

3) Data Related To Technology and Relevant Security Breaches:
Industry:  Financial
Company: Banking: Lincoln National and Citi Bank
Type of Breach: PII Information Storage and Trnsmission Breach
             I) Lincoln Financial: "Information loss from mishandling of private personal access
             codes and passwords" (Phifer, 2011).
             II) Citi Bank: "Human error-due to extent of loss-indication of employees
             engaging in White Collar Crime: Fraud" (Phifer, 2011).
Severity of Breach:
             I) Lincoln Financial: "This single incident accounts for nearly all of the records breached by insider access during 2010 – but most other insider breaches were reported as having unknown record impact. According to the ITRC, just 51 percent of all breaches report number of records exposed, making it hard to assess their severity (Phifer, 2011)."
             II) Citi Bank: "For example, approximately 600,000 CitiGroup were sent annual tax documents that had Social Security numbers printed on the outside of the envelope (Phifer, 2011)."

Types of Violations:
Violation: "Insecure storage or transmission of PII and other sensitive information (University of Califonia: IT, 2015).
Penalties: There are penalties for PCI non-compliance (University of Califonia: PCI-DSS, 2015):
"The Payment Card Industry, has established fines of up to $500,000 per incident for security breaches when merchants are not PCI compliant" (University of Califonia: PCI-DSS, 2015)."
"In addition, it is required that all individuals whose information is believed to have been compromised must be notified in writing to be on alert for fraudulent charges. As such, the potential cost of a security breach can far exceed $500,000 when the cost of customer notification and recovery is calculated (University of Califonia: PCI-DSS, 2015):"
Potential cost of a security breach:
Fines of $500,000 per incident for being PCI non-compliant;
Increased audit requirements;
Potential for campus wide shut down of credit card activity by your bank;
Cost of printing and postage for customer notification mailing;
Cost of staff time (payroll) during security recovery;
Cost of lost business during register or store closures and processing time;
Decreased sales due to marred public image and loss of customer
                              confidence. (University of Califonia: PCI-DSS, 2015)

Technology and Security Breaches: 2011

1) Communication Technology: Telemedicine: Robotic Check-Ups
Technology is a cost-effective and increasingly potent means to connect clinics in the vast and medically underserved rural regions of the United States with big city medical centers and their specialists as a tool for triage and assessment in emergencies, but new medical robots go one step further—they can now patrol hospital hallways on more routine rounds, checking on patients in different rooms and managing their individual charts and vital signs without direct human intervention. The RP-VITA Remote Presence Robot produced jointly by iRobot Corp and In Touch Health is the first such autonomous navigation remote-presence robot to receive FDA clearance for hospital use. The device is a mobile cart with a two-way video screen and medical monitoring equipment, programmed to maneuver through the busy halls of a hospital. (MacRae, 2013)
Technology is intended to improve lives-purportedly. Medicine from a distance-could be really scary. I understand, that there are situations, whereby, a medical pprofessional is not available, however, in my opinion, the long distance medical robot-is too unfavorable. If you are not able to care for own medical needs, then I think you should stay in a well populated area. You have to be competent, and responsible for your own needs.

2) Security Breach: 2011:
A) "Sutter Physicians Services. Data from both Sutter Physicians Services and Sutter Medical Foundation was breached in November 2011 (Schwartz, 2011)."
B) Tricare and SAIC. "In September, backup tapes containing SAIC (Science Applications International Corporation) data were stolen from the car of a Tricare employee (Schwartz, 2011)."

3) Data Related To Technology and Relevant Security Breaches:
Industry: Medical Financial: Billing and Fund Raising Services
Company:
        I) Sutter Physicians Services;
        II) Tricare and SAIC.
Type of Breach:  "PII Information Storage and Transmission Breach (University of Califorinia: IT, 2015)." On college campuses, Universities in the US, try to reinforce information breaches-I do not know that it is possible. There is a warning, about keeping your information, as private as possible, and then what happens-when the information is breached, is what always happens. There really is not resolution the situation. Private information-that has been exposed is useless, and the US never replaces Social Security numbers-not that I am aware of.
          I) Sutter Physicans Services: . . ."A thief stole a desktop computer from the organization, which contained about 3.3 million patients' medical details--including name, address, phone number, email address and health insurance plan name--stored in encrypted format" (Schwartz, 2011); IT information-is stolen everyday in the US. I think it is a problem, that Americans continue to pretend, like anything IT-can be kept private. US police steal my: computers, laptops, servers, flash drives, memory cards, cell phones, digital cameras, Photo ID cards, Social Security cards, Welfare benefits card, food stamp card-you name it, if it is related to personal information-police in the US steal it.
           II) Tricare and SAIC: PII data breach, ". . .Data related to current and retired members of the armed services, as well as their families" (Schwartz, 2011). Military personel, are in a more vulnerable position in the US-than most of the rest of us. There are a large number of immigrants in the US, who are actively supporting Intl Terror. Members of our US military, and secret service government employees, have far more to be ocncerned about when it comes to data breach issues: phone number, home address, family members, etc. Intl Terror illegally target honest, and hard working members of our US military and government.
Severity of Breach:
           I) Sutter Physicans Services: "The security lapse occurred on two levels: both the data itself (being unencrypted) and the physical location (stored in an unsecure location)," according to the PRC report" (Schwartz, 2011); I have found, that when it comes to keeping data perfectly safe-then, I need to hand deliver it. If I wrote everything down, if I talked about everything-then, nothing about would be private. Some people, will take your everything-and then leave you dying in the dirt, right outside your own home-I know, it is happening to me. I am an American-what do I have? Nothing.
           II) Tricare and SAIC: "The breach led to a $4.9 billion lawsuit being filed, which aims to award $1,000 to each of the 5.1 million people affected by the breach" (Schwartz, 2011):
"The Tricare/SAIC breach is significant because not only are the victims at risk of medical identity theft, but financial identity theft as well. The breach begs several questions: Why were the backup tapes being transported in an employee's personal vehicle? And why were those records not encrypted?" (Schwartz, 2011)
When there are: rules, laws, and regulations-then those are just guidelines, to help people learn what the rules are. When people refuse to follow the law, or to reinforce the law-then, the fact that something is in writing, is on absolutely no help. America is a failed country, and a police State. You could call the police, and chances are-they will make your situation worse, they my even kill you, for your laptop!
Violations:
HIPPA Violtaions for both Companies, handling private and secure medical patients information. H
Penalties:
        Sutter Physicans Services: "A class-action lawsuit lodged against the companies alleged that they also failed to inform affected patients about the breach in a timely manner" (Schwartz, 2011); HIPPA violations, happen everyday. I find it very hard to believe, that it is possible to sue over the issue. Poeple who work in hospitals-talk about anything. In my opinion-based on my own painful experiences-nothing is private in the US.
        Tricare and SAIC: HIPPA Penalties Apply. I think, that is the HIPPA penalities, could be reinforced-peeople everywhere, would be suing. I, took HIPPA training myself. I took the guidelines seriously, and would not have breached anyone's personal information. However, my experience has been-that the new immigrants to the US, those supporting Intl Terror, are always dishonest. If something were really important to me-information or anything else, I would not trust anyone else, with that: information, etc.
Penalties Continued: HIPAA Violation and Penalty Payment-Criminal Charges Are Also Possible:
HIPAA violations cost your practice. The federal fines for noncompliance are based on the level of perceived negligence found within your organization at the time oft he HIPAA violation. These fines can range from $100 to $50,000 per violation (or per record), with a maximum penalty of $1.5 million per year for each violation. OCR has also levied criminal charges for HIPAA violations in the past. (Complaincy Group, 2015)
When there are no reinforcable penalties-then people will speak to you in any way, and will treat you in the most disdainful ways. America is a nightmare. There are people here, who support Intl terror, from all over the world, and there is no one to complain to-if a US law is broken. US police never respond. The Feds, take a message, and never get back-to-you.

Technology and Security Breaches: 2012

1) Communication Technology: Social Media: Facebook Timeline: Significantly Increased Data Collections Online:
In the past, much of the data that users contributed to Facebook was in the form of unstructured status updates. The addition of a “Like” button, and the ability to link that button to third-party websites (Social Indexing: May/June 2011), provided somewhat more fine-grained information that could be used for targeting ads. Timeline goes well beyond that, prompting users to add an extensive array of metadata to their updates, which makes mining value much easier. And by design, it encourages users to revisit and add more information to old updates, or retroactively add completely new biographical information. (Greenwald, 2012)
I think there need to be, more new start up companies-that are not cenetered around California-that focus on online social media. I wonder, why other countries, have not developed more computer technology-the field in not that challenging. As a consumer-I want more choices.

2) Breach: Disquis Confirms 2012 hack of the comment tools:
Disqus has confirmed its web commenting system was hacked. The company, which builds and provides a web-based comment plugin for news websites. About a third of those accounts contained passwords, salted and hashed using the weak SHA-1 algorithm, which has largely been depreciated in recent years in favor of stronger password scramblers. The data also contained sign-up dates and the date of the last login. (Whittaker, 2017)
I think that someone normal-an American hacked Disqus. It is insulting to Americans, that online social networking websites, remove people's comments. Americans have a US Constitutional Right-that protects our ability to communicate.

3) Data Related To Technology and Relevant Security Breaches:
Industry: Internet and Online Social Networking
Company: Social Networking Start Up: Disqus
Type of Breach: "IIP Personal Information Breach" (University of California: IT, 2017).
"Hackers stole more than 17.5 million email addresses in a data breach in July 2012" (Whitaker, 2017).
Severity of Breach:
"Some of the exposed user information dates back to 2007. Hunt added that 71 percent of email addresses were already in Have I Been Pwned's database of more than 4.7 billion records" (Whittaker, 2017). Have I Been Pwned-is an Intl Blackmarket-for stolen information. It is illegal, to: buy, sell, or trade-"hot" stolen items-even on the Internet.
Violations:
Two states, Nevada and Minnesota, require Internet Service Providers to keep private certain information concerning their customers, unless the customer gives permission to disclose the information. Both states prohibit disclosure of personally identifying information, but Minnesota also requires ISPs to get permission from subscribers before disclosing information about the subscribers' online surfing habits and Internet sites visited. (US Government: NCSL: Privacy& Personal Info., 2017)
Only two states in the Union, have even attempted, to reinforce online: rules or regulations. The task, of policing the Internet, is soo incredibly difficult, and that is one of the main reasons, why-the WEB, is not really regulated.
Penalties:
Several states have introduced measures in response to the repeal of federal Internet privacy protections that were approved by the Federal Communications Commission in the final days of the Obama administration. The rules, which had not yet gone into effect, would have put tough restrictions on what internet service providers could do with consumer data collected. (US Government: NCSL: Privacy& Legislation., 2017)
On October 27, 2016, the US FCC, released new rules, to govern the safety of Internet use, and to further protect consumers, from: fraud, identity theft, hackers, and other activities-that, currently, and frequently now occur online. The new laws, that were issued, on October 27, 2016-were at the very end, on the Obama Administration: "FCC ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY AND SECURITY FOR THEIR PERSONAL DATA" (Hart, 2016). Because the Internet, is relatively new terrirtory, and not ruled by very many laws-it is extremely difficult, to reinforce penalties-when any crime at all-occurs on the Internet-particularly, through online social networking.

Technology and Security Breaches: 2013

1) Communication Technology: Temporary Social Media:
". . .While Snapchat promises to erase photos from its servers, the company’s privacy policy adds that it “cannot guarantee that the message data will be deleted in every case" (Rosen& Rosen, 2017). There are no benefits, to pretending, like information is not: spidered, and sorted, and collected, and stored-from online activity. Snapshot is not deleting the inappropriate communications or photos.

2) Security Breach: 2013:

A) Twitter Breach:
"The company made. . . announcement of a data breach in February that exposed the usernames, email addresses and encrypted passwords of 250,000 users" (Rosen& Rosen, 2017). The US suffers data breaches, of a serious nature-daily. Nothing is secure in the US-really. As Americans, our information is everywhere-and then it is stolen, and the information is sold on the: Blackmarket.
B) Zendesk Breach:
"Despite all the technologies in place at organizations to protect user data, sometimes a third-party breach exposes information" (Rosen& Rosen, 2017). Third party, and other breaches happen all the time. There are companies all over the Internet-collecting, and catloging, and posting lists on personal information online-it is illegal, and the information about you-is for sale. The US Feds, do nothing about the problem, and people are afraid, to complain, because US police, are already editing important and pertinent information out of our: Wiki pages, and other US government websites. America, is a police State. Thank God-we even have an Internet still!

3) Data Related To Technology and Relevant Security Breaches:
Industry: Online Social Networking: Start Up Internet Company
Company:
      I) Twitter
      II) Zendesk
Breach:
       I) Twitter: "The company announced that it detected unusual network activity" (Rosen& Rosen, 2017). Twitter, and other online social networking companies-monitor client accounts too closely, and it is illegal. Twitter has hired enough employees-that people working for them, follow, every signle letter that you type-of every single Tweet that you send. Twitter thinks every other Tweet I post, is unusal activity. I spend a great deal of time, on line, complaining about human rights abuses in the US. Twitter supports and Intl terrorists agenda.
       II) Zendesk: "Zendesk, which provides customer support messages to users of Twitter, Tumblr and Pinterest, announced a data breach in February that impacted its clients" (Rosen& Rosen, 2017). Information online, can never be safe-with soo many people handling the information. Online social networking companies, hire employees-from all over the world, and have headquarters-in most major cities, in other countries: London, France, Mexico City, etc.
Severity of Breach:
        I) Twitter: "We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information," wrote Bob Lord, director of information security at Twitter. "This attack was not the work of amateurs, and we do not believe it was an isolated incident."
        II) Zendesk: "The breach exposed thousands of email addresses and support messages from users of the services. Security experts said the email addresses were valuable to attackers because they could be used in well-designed phishing attacks to bait victims for more information" (Rosen& Rosen, 2017).
Violations: There is a violation of trust. Innocence is lost. There really are no reinforcable laws concerning the Internet-and an exposure of personal information. Only 2 State in the Union, tried to ratify laws, that would protect personal information-shared online. Mr. Obama, signed some new FFC laws into place-just before he left office, and because it was too close to his exit stage Left, the laws are unpopular, and therefore-with no political support-the laws have not been ratified, or reinforced.
Penalties:
         I) Twitter: "Twitter recently rolled out support for two-factor authentication to bolster the      security of its user base" (Rosen& Rosen, 2017).
         II) Zendesk: Social Networking companies, from the US-do not follow US law. The online companies, operate in any ways and means-that they have deemed. The way in which US social networking companies operate, because it is outside, the guidelines of the US laws, and government: rules, and regulations-are operating illegally. Online social networking companies in the US-make decisions, regarding coomentary, and information sharing-based on world politics. Most online social networking websites-from the US, if not all-illegally support: Intl Terrorism, and censor comments, from Americans.
          America, has a US Constitution, to protect American citizens-therefore, online Internet companies from the US, have no legal reights-to censor: "offensive commentary." There are almost rules or regulations, that can be enforced-on the Internet-however, the few that are enforcable, such as: no child porn, no children or slaves for sale online, no illegal or illict drug sales online-happen all of the time, and on the most popular online social networking websites. However, I am personally kicked out of Twitter-every 5 seconds, quite litterally, for making negative comments about: "Gay rape sex."
         Anal rape, is an Intl Terror agenda, and no legally allowed in the US. I am kicked out f Twitter, for complaining about: prostitution in the US. Prostitution, is not legal in the US. I get kicked out of Twitter-to objecting to Gay marriage, and to Gay adoption-and I have a human right-in the US, to hold that political point of view. Twitter, and many other online social networking websites-refuse to respect the US Constitution-and my: "Freedom of Speach." If there is a security breach, at an online social networking website-there really are no penalties, that can be reinforced.
             The online social networking company-can increase security measures, and-they can do almost anything else they want, as well-including selling the personal information, that you provide-while logged into their online social networking systems and servers. I do not believe-not for a minute, that any of the new: Snapshot data-is disappearing, I think it is being collected, and maintained, because that is how the Internet work. Snapshot, made you no promises. You should not have taken that picture!

Technology and Security Breaches: 2014

1) Communication Technology: immersive virtual worlds computer fantasy goggles:
 "Oculus Rift Thirty years after virtual-reality goggles and immersive virtual worlds made their debut, the technology finally seems poised for widespread use" (Hardekopf, 2015). People who have larger expendible income, make purchases from high-end retail stores, like: Neiman Marcaus and Sony. Employees, who work at name brand and designer stores, process credit cards with a higher available balance-generally. When a credit card with no-limit is stolen, it is worth much more, on the: Blackmarket. America is rife with: liars and theives. I think it would be dangerous to own a credit card-with, no limit.

2) Security Breach: 2011:

A) Neiman Marcus:
"In January, news broke of a card hack at Neiman Marcus where hackers accessed the debit and credit card information of customers who shopped at this chain between July 16, 2013 to October 30, 2013" (Hardekopf, 2015). Neiman Marcus, and other high end stores-should be more careful, about who they hire, and how credit cards are processed. When people pay significantly more, for retail products-they logically expect, a better quality of product, and a better quality of service.
B) Sony:
"Data continues to come out about this November 24 Sony breach. The security firm Identity Finder found the hack exposed over 47,000 Social Security numbers, including over 15,000 current or former employees" (Hardekopf, 2015). A breach of personal information, is always a serious problem, for a consumer. A US Social Security card-is supposed to be well gaurded-at all times. When a Social Security card is stolen, there are several government websites, that the identity theft can be reported to. You can also go into your local Social Security office-to request immediate action-to protect your identity. The US government, never responds, to any of the complaints, and the Social Security Office tells you-that the theft, is not serious-a lie.

3) Data Related To Technology and Relevant Security Breaches:
Industry: High End Retail
Company:
A) Neiman Marcus
B) Sony
Type of Breach: Hackers
            I) Neiman Marcus: "Only in-store customers were affected, not online transactions" (Hardekopf, 2015). You can never tell-really, if a person is telling you the truth. There are too many instances-especially in major companies, when people are more worried about the bottom line. US companies lie to the general public-all of the time, to protect, their shares on Walstreet.
           II) Sony: "In early December, hackers leaked five unreleased movies online and some employees' Social Security numbers" (Hardekopf, 2015). Hacking, is not that difficult. Computer systems retain information. People choose not to protect their passwords. The passwords that are chosen-are easy to guess, if you know the person, and so on.
Severity of Breach:
            I) Neiman Marcus: "Originally, the company estimated that as many as 1.1 million cardholders could have been affected. But further investigation found that it affected a maximum of 350,000 customers. The breach occurred when malicious software was installed onto the Neiman Marcus system that collected payment card data from customers who made purchases during those dates" (Hardekopf, 2015). I think-when reporting information breaches, that it would be more helpful, to talk about the information breach affects people-and not just a guess, in regarding how much information was exposed.
            II) Sony: "In addition, these numbers appeared more than 1.1 million times on 601 publicly-posted files stolen by hackers. A significant number of files containing the Social Security numbers were accompanied by other personal information, such as full names, dates of birth and home addresses, increasing the chances of identity fraud" (Hardekopf, 2015). I think that breaching personal data, in mass numbers-is an act of Intl terrorism. Data breaches happens soo often in the US, and the impact is soo negative-that when an individual posts the information publically, it is obviously malicious, and vicious act against Americans.
Violations:
"Our office (Social Security Office) does not investigate the loss or theft of personal property including wallets and purses containing personal identification. If your wallet or purse containing your Social Security Card is stolen, contact your local police department immediately to file a theft report. You should also contact SSA directly at 1-800-772-1213 to request a replacement Social Security Card" (US Government: Social Security, n.d.). The local police, steal Social Security cards, and would-in reality, do nothing, to assist an individual, in recovering one.
Penalties:
"If someone uses your Social Security number to obtain credit, loans, telephone accounts, or other goods and services, contact the Federal Trade Commission (FTC). The FTC collects complaints about identity theft from those whose identities have been stolen" (US Government: Social Security, n.d.). "Concerned about how a company is handling your personal information? Report concerns, use the identity theft category" (US Government: FTC, n.d.). I have contacted the FTC, several times, about stolen credit cards, and other government ID's-that were stolen, to protect my identity-and the FTC, never responded. There are a number of US government, and employees, like the: Department of Justice-which exist, and that, do absolutely nothing, for anyone.

Technology and Security Breaches: 2015

1) Communication Technology: Apple Pay: Pay From Your Cellphone:
"A clever combination of technologies makes it faster and more secure to buy things with a wave of your phone" (Robert, 2017). With an increase in innovations, that utilize data transmissions, over WiFi-or WiFi accessible electronic devices, like cellphone, the security of your personal information decreases. In theory, a new fun electronic toy-is a welcome entertainment. In reality-another new way, to transmit inormation from your banking institution-has new, and added financial risks.

2) Security Breach: 2015: Experian/T-Mobile
T-Mobile uses Experian to process its credit applications. Experian explained the details on its Web site: The unauthorized access was in an isolated incident over a limited period of time. It included access to a server that contained personal information for consumers who applied for T-Mobile USA postpaid services or products, which require a credit check, from Sept. 1, 2013 through Sept. 16, 2015. (Ramanan, 2015)
Credit checks are mandatory for even small lines of credit in the US. Experian, is 1, of 3 major credit agencies. Due to the fact, that there are only 3 major credit checking agencies in the US-businesses, and consumers-have almost no choice about who they work with.

3) Data Related To Technology and Relevant Security Breaches:

Industry: Cellphone Communications and Banking/Credit Check Services
Company: T-Mobile and Experian
Type of Breach:  "Experian Plc (EXPN.L), the world's biggest consumer credit monitoring firm disclosed a massive data breach that exposed sensitive personal data of some 15 million people who applied for service with T-Mobile US Inc" (Ramanan, 2015). I think, that-because credit is important, and because there are risks attached to any transactions, that people need to make better informed decisions, regarding who they work with. Some companies, and some transactions-are safer than others.
Severity of Breach:  "No. of records compromised: 15 million people’s records" (Ramanan, 2015). There is no scale, for the severity of a secure information breach. Any number of records lost-over 1 million-must be severe.
Violations: "IIP Personal Information Breach" (University of California: IT, 2017). If a company breaches an agreement with you, to keep your personal data and information safe-you can report them, to the: Better Business Bureau (BBB) (BBB, 2017). I do not know, what the consequences are-if any, for filing a BBB report online?
Penalties: Information breaches, are soo common in the US-you take your chances. To rememdy the situation, you can log online, and research various credit repair, and credit protection services. Chances are, that T-Mobile, and Experian-will inform clients, that they will increase their security measures. No penalties-will be levied, against either: T-Mobile or Experian.

Technology and Security Breaches: 2016

1)Communication Technology: Intl Terror Target: FBI &Homeland Security: Hackers:
"Power from the Air: Internet devices powered by Wi-Fi and other telecommunications signals will make small computers and sensors more pervasive" (Harris, 2017). WiFi has passcodes, and people share WiFi passcodes, on the Blackmarket-it is for sale, just like every thing else. Additionally, there are programs-that help you, to hack WiFi passcodes. Everytime, you log-on to a public WiFi website now, there is supposed to be a warning, regarding the vulnerablity, of data being shared-over a public WiFi. It is interesting to me, that electronice devices-in the very near future, will be powered by WiFi-like power from the airwaves, and it also sounds like a security breach to me.

2) Security Breach: 2011:
Federal Bureau of Investigation, Department of Homeland Security
"In February, hackers threatened to, and ultimately did, dump the records of nearly 30,000 FBI and Department of Homeland Security workers" (Karunda, 2016). It is difficult to discern, when examining a data breach, how hackers accessed information. Many times, it is presumed, that the hackers, uploaded a: virus, or a worm, or utilized social engineering-and stole passwords themsleves. Often times, hackers can steal information, by jumping on WiFi, and boarding the computers, and the servers themselves-remote access.

3) Data Related To Technology and Relevant Security Breaches:
Industry: US Secret Service
Company: US Federal Government
Type of Breach: Main Server Breach: "The records included personal information on around 9,000 DHS employees and around 20,000 FBI employees, including names, titles and contact information" (Karunda, 2016). It is dangerous for US Federal employees, to have their personal information breached. However, USSS-can arrest, for almost any reasons at all. If the culprits-who stole the Feds personal information-could be located, they could be arrested, for the terrorists, that they are-further protecting: America and American citizens, from Intl Terror.
Serverity of Breach:   "The hacker, which first reached out to Motherboard with the files, claimed he had access to even more files, totaling 200 GB" (Karunda, 2016). Information must be duplicated, for better preservation. Some people will steal anything. Vital Federal government information, needs to be saved on safe servers, outsidw of the US-not just in D.C..
Violations: Violation of Laws Protecting US Secret Service Employees
Penalties: USSS: United States Secret Service
. . . The Secret Service has evolved to serve a dual mission of investigating financial crimes and providing protection for the president, vice president, their families, and other political figures, both U.S. and foreign.Criminal investigations covered by the Service include computer and telecom fraud, identity theft and financial institution fraud - and recently, investigations into computer-based attacks on the nation’s financial and informational infrastructure, often under the auspice of anti-terrorist activities. (USSS, 2016)
The duties and obligations, of USSS-keep the President of the US safe. If President Trump, is discontent-with those sworn to take a bullet, for his protection-then, he should hire someone else. The US, is such a dangerous country, I am not able to agree, that President Trump is safer than me-just because he has USSS, watching over him. It is almost inpossible to complain about anything in America. If something were wrong in the Whitehouse-in D.C., I seriously doubt, that President Donald Trump, would be able to complain about it. In America-you have to keep yourself safe-I know the police never help anyone.

Technology and Security Breaches: 2017

1) Communication Technology: Cyber Warfare: Major Internet Problem For US: 2017
Conversational System:
The current focus for conversational interfaces is focused on chatbots and microphone-enabled devices (e.g., speakers, smartphones, tablets, PCs, automobiles). However, the digital mesh encompasses an expanding set of endpoints people use to access applications and information, or interact with people, social communities, governments, and businesses. The device mesh moves beyond the traditional desktop computer and multiple devices to encompass the full range of endpoints with which humans might interact. As the device mesh evolves, connection models will expand and greater cooperative interaction between devices will emerge, creating the foundation for a new continuous and ambient digital experience. (Microsoft, 2017)
I think that it is dangerous, to be too connected. When passwords are interchangable, and when computer systems are all relying on ech other, for information, and functioning-then, it is much easier-to take down an entire country-with a destating cyber war.

2) Security Breach: Intl Terror Attack: Cyber Warfare: Predicted, or Real and Here? 
"Nation-state cyber-attacks will move from espionage to war. Experian predicts that cyber conflicts between nation-states will escalate from espionage to cyber-warfare in 2017" (Olavsrud, 2017). The acrimony, between Americans, and the new immigrants who support Intl Terror is growing. Intl Terror, fly though the US, and often times-now, call US homes. I agree-that a cyber war, would be more peaceful-however, I have serious concerns, as to whether a cyber war, could ever resolve any disagreements. War aspects-it seems to leads, leads to further agitation, and more war-not: Peaceful Negotiations, and World Peace.

3) Data Related To Technology and Relevant Security Breaches:
Industry: Department of Defense: Pentagon
Experian notes that when the issue of state-sponsored cyber-attacks came up during the recent U.S. presidential campaign, both candidates said they would favor using cyber weapons to retaliate, leading Experian to predict an escalation in cyber-attack conflict in 2017. These conflicts will tend to leave consumers and businesses as collateral damage. (Olavsrud, 2017)
It is the obligation, of the US Pentagon, to keep America safe, with the war machines. Has the US Pentagon agreed to wage a cyber war-against Intl Terror, and if so, then it requires a formal announcement, to the general public-just like any other deadly exchange.
Company: United States Government
" 'The progression of cyber-attacks driven by nation-states will undoubtedly place critical infrastructure in the crosshairs, potentially leading to widespread outages or exposed personal information that could impact millions of innocent consumers,' the report said" (Olavsrud, 2017). Cyber war, is generally not violent, it is only malicious, and frustrating. Cyber war, is a fast quick war-if done the wrong way, to engage in fraudlent acts-that would cause one to be classified as a felon.
Type of Breach: Cyber Attack, Massive Breach of Info.& Attack of US Internet, Computer, Server, WAN/LAN, Website-systems
Severity of Breach:
Experian recommends companies address this threat by participating in their respective Information Sharing and Analysis Center (ISAC) to share cyber threat information with peers and national defense organizations. Additionally, businesses &8212; especially businesses involved in critical infrastructure — should prepare for full-on disruption. Proactive steps could involve purchasing insurance protection and shoring up security measures against large-scale disruptions. (Olavsrud, 2017)
Preventative measures, are always important. However, Cyber war, is unpredictable-or it would not be effective. A pre-emptive strike, is preferable, to a response focus-solely on defense, if an ememy is preparing to attack.
Violations: Espionage, Treason, Intl Terror
Penalties: Gitmo, Death Penalty

Notes: Online Resources:
Regulating Bodies:
SEC https://www.sec.gov/
ITRC http://www.itrcweb.org/
NCSL http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
IRS https://www.irs.gov/
NCUA https://www.ncua.gov/Pages/default.aspx
FDIC https://www.fdic.gov/
The Feds: FOIA https://www.federalreserve.gov/foia/about_foia.htm
Office of the Comptroler of the Currency https://www.helpwithmybank.gov/national-banks/national-banks.html

Definitions:
Personal Identity Information (PII):
Personal identity information (PII) is unencrypted computerized information that includes an individual’s first name or initial, and last name, in combination with any one or more of the following:
Social Security number (SSN);
Drivers license number or State-issued Identification Card number;
Account number*, credit card number, or debit card number in combination with any required security code, access code, or password such as expiration date or mother’s maiden name that could permit access to an individual’s financial account;
mental or physical condition, or medical treatment or diagnosis by a health care professional;
Health insurance information, including an individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual’s application and claims history, including any appeals records. (Uinversity of California: IT, 2015)

Restricted Data:
“Restricted data”: “Any confidential or personal information that is protected by law or policy and that requires the highest level of access control and security protection, whether in storage or in transit” (University of California: IT, 2015).

References

Better Buisness Bureau (BBB) (2017). Start With Trust. Better Business Bureau: An ethical marketplace where buyers and sellers trust each other. Retrieved from https://www.bbb.org/en/us/

Complaincy Group: HIPPA Violations and Breaches (2017). HIPPA Fines Listed By Year. Compliancy Group: HIPPA Done Right. Retrieved from https://compliancy-group.com/hipaa-fines-directory-year/

Fletcher, Dan (2010). The 50 Best Inventions of 2010. Time. Retrieved from http://content.time.com/time/specials/packages/article/0,28804,2029497_2030652_2029803,00.html

Greenewald, Ted (2012). Facebook's Timeline. MIT Technology Review. Retrieved from
http://www2.technologyreview.com/news/427678/facebooks-timeline/

Hardekopf, Bill (2015). Forbes: Worst Data Breaches of 2014. Forbes: Worst Data Breaches of 2014. Retrieved from https://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/#6bbd3cacefe6

Harris, Mark . (2017). Power From The Air. MIT Technology Review. Retrieved from https://www.technologyreview.com/s/600773/10-breakthrough-technologies-2016-power-from-the-air/

Hart, Kim (2016). FCC ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY AND SECURITY FOR THEIR PERSONAL DATA. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx

Karunda, Sarah. (2016). The 10 Biggest Security Breaches For 2016. CRN. Retrieved from http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm

MacRae, Michael. (2013). Top 5 Medical Technology Innovations. ASME: The American Society of Mechanical Engineers. Retrieved from https://www.asme.org/engineering-topics/articles/bioengineering/top-5-medical-technology-innovations2)

Microsoft. (2017). Technology Trends for 2017. IT Business Trends. Retrieved from http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2017.html

Olavsrud, Thor. (2017) 5 Data Breach Predictions 2017. CIO from IDG. Retrieved from https://www.cio.com/article/3155724/security/5-data-breach-predictions-for-2017.html

Phifer, Lisa (2011). Top 10 Data breaches: 2010. eSecurity Planet. Retrieved from
https://www.esecurityplanet.com/views/article.php/3921656/Top-10-Data-Breaches-of-2010.htm

Ramanan, Sai (2015). Forbes: Top 10 Security Breaches of 2015. Title of Online Periodical. Forbes. Retrieved from https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/#570fdb5140d6

Robert, Hof (2017). Ten Breakthrough Technologies (2015). MIT Technology Review . Retrieved from https://www.technologyreview.com/s/535001/apple-pay/

Rosen, Christine,& Rosen, Jeffrey (2017).Temporary Social Media Messages that quickly self-destruct could enhance the privacy of online communication and make people feel freer to be spontaneous. MIT Technology Review. Retrieved from https://www.technologyreview.com/s/513731/temporary-social-media/

Schwartz, Mathew J. (2011). 6 Worst Data Breaches of 2011. The Dark Room. Retrieved from https://www.darkreading.com/attacks-and-breaches/6-worst-data-breaches-of-2011/d/d-id/1102001
University of California: Santa Cruz (2015). Information Technology Services. University of California: Santa Cruz: University Home: Security: Breches. Retrieved from https://its.ucsc.edu/security/breaches.html

University of California: Santa Cruz (2015). PCI-DSS Security Penaltes. University of California: Santa Cruz: University Home: Security: Penalties. Retrieved from https://financial.ucsc.edu/Pages/Security_Penalties.aspx

US Government (n.d.). FDIC: Federal Deposit Insurance Corporation. Retrieved from https://www.fdic.gov/

US Government: FTC (n.d.). Federal Trade Commission: Protecting Americas Consumers. Retrieved from https://www.ftc.gov/

US Government (n.d.). Internal Revenue Service. Retrieved from https://www.irs.gov/

US Government (n.d.). Interstate Technology and Regulatory Council. Retrieved from http://www.itrcweb.org/

US Government. (n.d.). NCUA: National Credit Union Association. Retrieved from https://www.ncua.gov/Pages/default.aspx

US Government (n.d.). Security Breach Documents. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx

US Government (n.d). Securities Exchange Commission. Retrieved from https://www.sec.gov/

US Government (n.d.). The Feds: Board of Govenors Federal Reserve. Retrieved from https://www.federalreserve.gov/foia/about_foia.htm

US Government (n.d.). Who Regulates My Bank. Retrieved https://www.helpwithmybank.gov/national-banks/national-banks.html

US Government: NCSL (n.d.).(2017). Privacy of Personal Information Held By Internet Services. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx#ISPs

US Government: NCSL (2017). Privacy Legislation Related To Internet Providers. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx

US Government: OIG (n.d.). Office of The Inspector General: Social Security Administration. Retrieved from https://oig.ssa.gov/report-fraud-waste-or-abuse/what-cant-oig-investigate

United States Secret Service (2016). United States Secret Service (USSS). ALL Gov: Everything Our Government Really Does. Retrieved from http://www.allgov.com/departments/department-of-homeland-security/united-states-secret-service-usss?agencyid=7355

Whittaker, Zack (2017). Disquis Confirms 2012 hack of the comment tools. Zero Day Net. Retrieved from http://www.zdnet.com/article/disqus-confirms-comments-tool-hacked/










Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2