A Push in Cyber Security Calls for Scanning Private Sector Web Use

By

While the U.S. government probably doesn't care about all the time you spend on Reddit trolling cat memes while on the job, now may be the time to reel that careless Web surfing in a bit – that is, for your own country's safety.

Under an executive order passed last month, the Obama Administration is expanding its cybersecurity program to include scanning of Internet traffic in the private sector. 

The Web and e-mail activity within major banks, utility companies and transportation organizations will now be officially scanned as a precaution against espionage threats and other hacking attempts. If this sounds absurd, consider this: U.S spy chiefs currently claim that cyber attacks have supplanted terrorism as the top threat to the country. Can we get a “wow”?

So computers could be the end us of after all – just not the way we dreamed it in sci-fi nightmares.

Whatever data the Department of Homeland Security (DHS) collects from these scans will be held as secret, and turned over to a group of telecommunication companies and cyber security providers in charge of holding security clearances.

Intelligence from the National Security Agency (NSA) will be driving the investigation.

Citizens have long been wary of an invasion of their privacy by the NSA. By planting the DHS between private sector workers and the spy agency, the Obama Administration hopes to bring NSA's wealth of overseas intelligence-gathering closer to home, without shaking anyone up too much.

A DHS official said that data won't be relayed to the government except in aggregate statistics. Like any good spy, the official refused to be identified. Procedures are to be established within six months of the order.

And this may only be the beginning. The Obama Administration is also seeking legislation that would give incentives to private companies to disclose more to the government.  




Edited by Braden Becker
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More