{"id":8855,"date":"2017-01-28T12:37:22","date_gmt":"2017-01-28T12:37:22","guid":{"rendered":"https:\/\/apnlive.com\/?p=8855"},"modified":"2017-01-30T07:56:36","modified_gmt":"2017-01-30T07:56:36","slug":"world-leaders-cyber-security","status":"publish","type":"post","link":"https:\/\/apnlive.com\/world-news\/world-leaders-cyber-security\/","title":{"rendered":"World Leaders and Cyber Security"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text]There is reason to be cautious, whether you are in India, or in the US\u2014Modi or Trump<\/em><\/p>\n

By Sujit Bhar<\/strong><\/p>\n

Eric Geller, an American cyber security reporter, reiterates in Pol<\/em>i<\/em>tico<\/em><\/span> that the Android phone that US President Donald Trump uses could be a cyber security threat for the White House and even for those inside the administration. Trump has been given a super secure, encrypted phone by his security aides and Geller quotes a New York Times<\/em> report which said Trump keeps using \u201chis old, unsecured Android phone, to the protests of some of his aides\u201d.<\/p>\n

He lays out two troubling issues. First, Trump reportedly uses a 2012 Samsung Galaxy S3, that \u201cno longer receives software updates from their manufacturers or wireless carriers\u201d. Which, in turn, means that it is open to security threats. Secondly, he points out that while Google\u2019s Android technology offers many more options to the user than an Apple iPhone does, it is hardly secure. The Apple encryption, on the other hand, is so secure that even the FBI has reported that it can\u2019t break through.<\/p>\n

So what are the problems? Geller talks about a research that found \u201cone of the most dangerous Android vulnerabilities, the so-called Stagefright bug, which lets hackers take control of a phone using only a text message.\u201d<\/p>\n

Now that is scary. Geller talked to Matthew Green, a computer science professor at Johns Hopkins University, who said: \u201cIt’s just crazy that the president is interacting with such an out-of-date and likely insecure device.\u201d This was echoed by Bruce Schneier a leading cyber security expert, who told Politico<\/em>: \u201cHis (Trump\u2019s) off-the-shelf Android could potentially become a room bug without his knowledge. An attacker could certainly hijack his apps.\u201d<\/p>\n

The question is whether Trump uses this phone to discuss state secrets, in which case somebody can easily snoop. If he texts from this phone, it possible that somebody (outside the administration) can read it. And since Trump is a Twitter-bug, a quick entry point is provided to the hackers through this.<\/p>\n

This was made evident in India through hackers who call themselves \u2018Legion\u2019; they had hacked into the email databases of some top journalists. That would be chicken feed if top hackers of the world manage to plant a Trojan-type bug into Trump\u2019s phone and then start listening.<\/p>\n

Technically, Trump\u2019s using his personal Andriod phone for official purposes would be akin to Hillary Clinton using her personal email to transfer important state documents; an issue Trump has never stopped harping on.<\/p>\n

Okay, there is this knowledge that Trump actually is less of a cyber guy and uses paper from a small notepad to scribble instructions. That, though, remains in the realm of uncertainty.<\/p>\n

Epiphany time<\/strong><\/p>\n

What this has done is that it has enlightened the pubic on the risks of existing in an insecure cyber atmosphere. India has taken this seriously too. Indian Prime Minister Narendra Modi has been seen with a number of phones, and there is curiosity as to which brand his phone actually is. But he has also been seen with an iPhone, and this probably is because of its security features.<\/p>\n

It is possible to secure an Android phone to only that extent. The intrinsic security structure of an iPhone has been upgraded to a very high level. So Modi, who is also a bit of a Twitter-bug will be secure while doing so.<\/p>\n

India is trying to get its act together as far as cyber security is concerned.<\/p>\n

According to the site SecurityIntelligence<\/em><\/span> there is major work on to bring India on a par with international security standards. India is set to introduce freshly minted encryption and privacy policies and will move to amend the existing laws that mostly fail to address international systems, and link with international law-enforcers.<\/p>\n

To start with, Indian has appointed a Chief Information Security Officer (CISO). At this point there is no national agency that can assess India\u2019s cyber security threats and weave responses. This is in the discussion stage, but things are moving fast. However, top level officers and the Prime Minister cannot wait for a system to be in place before securing national secrets and himself.<\/p>\n

During Modi\u2019s trip to the US in the Barack Obama regime, he had talks with the Americans regarding US-India Cyber Relationship Framework which will lead to legal frameworks as well as proper mechanisms for implementation. This has not, yet, translated into a treaty.<\/p>\n

India has cyber security deals with Malaysia and the European Union and more countries would soon come into this ambit.<\/p>\n

India is in a position to secure top government offices with alacrity, because India can afford to leapfrog the preliminary stages of development of a security system and directly adopt one that has worked so far.<\/p>\n

This is also relevant to commerce and industry. A report, \u201c2016 Cost of Data Breach Study: India\u201d said such cost increased 9.5 percent for each Indian company, with 41 percent of all Indian companies experiencing such data breach. This could be disastrous in the software and the pharmaceutical industries, which are India\u2019s Intellectual Property strengths at this point of time.<\/p>\n

Maybe Modi understands the threats a little more than Trump. There is reason to be cautious, whether you are in India, or in the US. Every level of citizenry is under a threat perception, probably for the first time in history.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

[vc_row][vc_column][vc_column_text]There is reason to be cautious, whether you are in India, or in the US\u2014Modi or Trump By Sujit Bhar Eric Geller, an American cyber security reporter, reiterates in Politico that the Android phone that US President Donald Trump uses could be a cyber security threat for the White House and even for those inside […]<\/p>\n","protected":false},"author":4,"featured_media":8859,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1511,2046],"tags":[2266,81,2265,73,2267,1878],"yst_prominent_words":[],"ppma_author":[140543],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/d2r2ijn7njrktv.cloudfront.net\/apnlive\/uploads\/2017\/01\/modi-trump.jpg","jetpack_sharing_enabled":true,"authors":[{"term_id":140543,"user_id":4,"is_guest":0,"slug":"apnnewsdesk","display_name":"APN Live","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/478eacb893eda88aa6ed8d99b005bf58?s=96&r=g"}],"_links":{"self":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts\/8855"}],"collection":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/comments?post=8855"}],"version-history":[{"count":0,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/posts\/8855\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/media\/8859"}],"wp:attachment":[{"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/media?parent=8855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/categories?post=8855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/tags?post=8855"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/yst_prominent_words?post=8855"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/apnlive.com\/wp-json\/wp\/v2\/ppma_author?post=8855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}