Thinking what needs to happen, is those states with family members who are denied should probably get an emergency court decision. Problem is, how many know this law actually exists? Thinking word needs to spread what these governors are violating in terms of the law, but the media certainly won't do it.
White House Releases National Strategy for 5G Security
The White House this week released its National Strategy to Secure 5G of the United States to formally frame how the nation will safeguard fifth-generation wireless infrastructure at home and abroad. The 7-page policy document sets forth the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure worldwide, arm-in-arm with [its] closest partners and allies.” Its release marks President Trump’s initial move to meet the requirements laid out in the Secure 5G and Beyond Act, which he signed Monday. The new law directs the president to produce a strategy “to ensure security of next generation wireless communications systems and infrastructure,” within 180 days of its enactment.
The publication was first reported by Politico Wednesday morning, but someone close to the White House confirmed to Nextgov Wednesday afternoon that the strategy was first released Monday—the same day the legislation was signed. The quietly-launched document outlines four distinct lines of effort that the bill called for it to include. They each briefly lay out the administration’s approaches and aims to: facilitate the domestic rollout of 5G; assess the risks and identify the core security principles of 5G infrastructure; assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide, and promote responsible global development and deployment of 5G.
A senior administration official reiterated to Nextgov Wednesday that the publication fulfills one of the administration’s key obligations under the new bill and it is meant to complement the Secure and Trusted Communications Networks Act, which Trump also recently signed into law. Further, the official noted that the Secure 5G and Beyond Act also mandated the creation of an implementation plan, which they said will be “much more detailed,” than the initial publication. “The development of the strategy was an interagency effort, led by the National Security Council and National Economic Council,” the official said. They also added that 5G security has been at the top of the president’s priority list “since day one” of the administration, and that Trump “felt it was important to capture his priorities in a national strategy.”
https://www.defenseone.com/technology/2020/03/white-house-releases-national-strategy-5g-security/164164/?oref=d-river
Forgot to include this:
White House Releases National Strategy for 5G Security
https://www.defenseone.com/technology/2020/03/white-house-releases-national-strategy-5g-security/164164/?oref=d-river
Indeed! It all coming full circle..
Chinese Hackers Attacked Foreign Health Care, Military, Oil Networks as Coronavirus Hit China
In January, the ‘widespread’ assault targeted a vulnerability in virtual desktops, cloud computing, and network applications, FireEye announced. As the coronavirus epidemic reached crisis level in Wuhan, China, in January, a known group of state-backed cyber hackers launched attacks at healthcare companies and other key industries outside the country, according to cybersecurity company FireEye. FireEye announced their findings on the attacks Wednesday morning, calling it “one of the most widespread campaigns we have seen from China-nexus espionage actors in recent years“. The Chinese hackers, a group known as APT41, are affiliated with the government but also conduct financial crimes for personal gain. FireEye reports that they targeted a specific known vulnerability in the national vulnerabilities database (CVE-2019-19781 affecting Citrix Application Delivery Controllers) on Jan. 20. The vulnerability could allow attackers to exploit virtual desktop, cloud computing, and networking applications to steal data. The group also hit military installations and oil and gas targets, FireEye said, without naming where or in which countries to protect the identity of their clients.
FireEye says there was a dropoff in the group’s cyberattacks five days later, around the Chinese New Year, which occurred on Jan. 25, which is common among China-based threat groups. China began to implement very strict quarantine measures in Hubei province on Jan. 23 suggesting that the activity was going on as the pandemic picked up momentum. There was another drop off between Feb. 2 and 19. “While it is possible that this reduction in activity might be related to the COVID-19 quarantine measures in China, APT41 may have remained active in other ways which we were unable to observe with FireEye telemetry,” they write in a blogspot posted Wednesday. Defense One is unable to independently verify their claims. Activity picked up again shortly after Feb. 19, they report. The current wave of attacks “seems to reveal a high operational tempo and wide collection requirements for APT41.”
The unprecedented level of remote working and living during the coronavirus pandemic has also seen an increase in cyberattacks, most notably phishing attacks targeting individuals with phony links and emails, according to cybersecurity company CrowdStrike. Attackers are coming from, but are not limited to sources inside China. “We’re seeing this from both nation-state actors, notably groups in China we track under PANDA designations, as well as criminal groups,” Robert Sheldon, CrowdStrike director of Government Technology Strategy, said in an email to reporters on Monday. PANDA is how CrowdStrike designates advanced persistent threat groups from China. The Pentagon has been worried about increased cyberattacks in light of increased telework. On March 16, during a “virtual town hall, Essye Miller, DOD’s principal deputy chief information officer, said that adversaries are “already taking advantage of the situation and the environment that we have on hand.”
On Tuesday, Defense Secretary Mark Esper reminded Defense Department personnel in another virtual town hall that working from home carried its own risks. “If you’re teleworking, if you’re doing anything that involves the networks and IT, be very, very careful of IT vulnerabilities. We are a little bit more exposed when we’re doing telework,” he said.
https://www.defenseone.com/technology/2020/03/chinese-hackers-attacked-foreign-health-care-military-oil-networks-coronavirus-hit-china/164078/?oref=d-mostread