Coffee Break // Cyber News 009
Good morning folks,
Happy Monday. I’m enjoying a cup of Columbian espresso as I filter through the weekend’s cybersecurity news. The government shutdown here in America continue to drags on and, like every government shutdown, it hasn’t really effected me in any way. Although, I am forced to muse, it could delay my payments from the National Guard. Hm. It feels weird to be even technically a government employee.
//
Weekend news roundup.
CISA expired last week, arguably weakening our nation’s cybersecurity posture by reducing the ability of private sector actors to share threat information with each other without liability. This, in turn, encourages foreign threat actors, like Salt Typhoon and other state-sponsored APTs to dig deeper into our networks and infrastructure.
Oversees, privacy rights continue to erode even faster than in the US as Hong Kong is on track to have real-time facial recognition features in it’s ever-growing base of surveillance cameras. More concerningly to the west, the UK continues to force those same measures down their citizens’ throats, and despite assurances that they only use such technologies to catch serious offenders, mounting evidence to the contrary indicates that the UK government will happily use every possible technology to prosecute even the most milquetoast of offenders, and never mind the innocent people caught up in the tech’s false positives.
But as we know, US soil is hardly free of its own privacy encroachments. Business is booming for child surveillance tools at work in many US schools. But ignoring the huge false positive rates and unreliability of many of their threat detection systems, hidden cameras in smoke detectors, changing rooms and bathrooms: