The New York Times: Intelligence Officials Warn of Continued Russia Cyberthreats

The New York Times: Intelligence Officials Warn of Continued Russia Cyberthreats

Mike Pompeo, the C.I.A. director, left, and Dan Coats, the director of national intelligence, spoke on Thursday during a hearing before the Senate Intelligence Committee.

WASHINGTON — On the same day that President Trump went on Twitter to renew his claim that the focus on Russian hacking was “a Democrat EXCUSE for losing the election,” his two top intelligence officials told the Senate on Thursday that Russian cyberactivities were the foremost threat facing the United States and were likely to grow only more severe.

The officials delivered the warning as the nation’s intelligence agencies released their annual worldwide threat assessment, which described the Kremlin’s “aggressive cyberposture,” evidenced by “Russia’s efforts to influence the 2016 U.S. election.”

Dan Coats, Mr. Trump’s director of national intelligence, repeated and endorsed, almost word for word, the Obama administration’s conclusion that “only Russia’s senior-most officials could have authorized the 2016 U.S. election-focused data thefts and disclosures, based on the scope and sensitivity of the targets.”

That conclusion is widely shared among Mr. Trump’s top national security officials. The only prominent dissenter appears to be the president himself, who has continued to insist that there is no conclusive evidence pinning the cyberactivity on the Russians, though he said in an interview with NBC News, “If Russia did anything, I want to know that.”

Only a few hours after the officials’ testimony, the White House said the dismissal on Tuesday of the F.B.I. director, James B. Comey, should help the bureau’s investigation of the Russian hacking come to a speedy conclusion. The intelligence officials, by contrast, said the inquiries into the matter must delve deeply into the question of how to prevent future attacks.

Mike Pompeo, the director of the Central Intelligence Agency, told the Senate Intelligence Committee that the Russians and others would try to meddle again in future elections and added, “I hope we learn from it as well and will be able to more effectively defeat it.”

Read full article here

This situation make us think about the BGF-G7 Summit Initiative – Taormina Plan.
We should make the Taormina Plan happen

BGF-G7 Summit Initiative of 2017

BGF-G7 Summit Initiative of 2017

Starting from 2016, Boston Global Forum will cooperate with host countries of G7 Summit to convene the world leading scholars, influential business leaders and young leaders, and government leaders of host countries to discuss and generate initiatives and solutions to the most global pressing issues concerning peace, security and development.

Initiatives will be sent to G7 leaders in G7 Summit


Download Brochure of The BGF-G7 Summit Initiative

The BGF-G7 Summit Initiative (BG7SI) is dedicated to advancing the collaboration between the BGF and G7 in addressing global issues.

The BGF-G7 Summit Initiative Delegations

In 2016, The BGF was cooperating with Japan – as the G7 Summit’s host, to convene leaders in academic business , government and technology to seek solutions to this year’s biggest problems. Proposals was sent to national leaders at the G7 Summit, held in Japan – May 26-27, 2016

In the year of 2017, BGF continues to host the BGF-G7 Summit Initiative Conference on April 25,2017 and has successfully delivered The Taormina Plan as BGF-G7 Initiative. Proposals will sent to national leaders at the G7 Summit, to be held in Italy – May 26–27, 2017.

Ethics Code of Conduct for Cyber Peace and Security ECCC Version 3.0

Ethics Code of Conduct for Cyber Peace and Security ECCC Version 3.0

THE ETHICS CODE OF CONDUCT FOR CYBER PEACE AND SECURITY (ECCC)

Version 3.0

Governor Michael Dukakis, Mr. Nguyen Anh Tuan, Mr. Allan Cytryn, Prof. Nazli Choucri, Prof. Thomas Patterson, Prof. Derek Reveron, Prof. John E. Savage, Prof. John Quelch, Prof. Carlos Torres.

The Boston Global Forum’s Ethics Code of Conduct for Cyber Peace and Security (ECCC) makes the following recommendations for maintaining the security, stability and integrity of cyberspace.

Net Citizens Should

• Engage in responsible behavior on the Internet, e.g.

o Conduct oneself online with the same thoughtfulness, consideration and respect for others that you expect from them, both online and offline

o Do not visit suspicious websites

o Do not share news or content from sources that are not trustworthy

• Learn and apply security best practices, e.g.

o Update software when notified by vendors.

o Ensure your PC has virus protection software installed and running.

o Use strong passwords, change them periodically, and do not share them.

o Do not transmit personally identifiable information to unknown sites.

o Maintain a healthy suspicion of email from unknown sources.

o For web communication use HTTPS instead of HTTP when possible.

Policy Makers Should

• Endorse and implement recommendations made by the 2015 UN Group of (G20). Below we summarize the important norms concerning information and communication technologies (ICTs).

1. [GGE] International law, including the UN Charter, applies online.

2. [GGE] States should help limit harmful uses of ICTs, especially those that threaten international peace and security.

3. [GGE] States should recognize that good attribution in cyberspace is difficult to obtain, which means miscalculation in response to cyber incidents is possible.

4. [GGE] States should not knowingly allow their territory to be used for malicious ICT activity.

5. [GGE] States should assist other states victimized by an ICT attack.

6. [GGE] States, in managing ICT activities, should respect the Human Rights Council and UN General Assembly resolutions on privacy and freedom of expression.

7. [GGE] States should protect their critical infrastructure from ICT threats.

8. [GGE] A state should not conduct or permit ICT use that damages the critical infrastructure of another state or impairs its operations.

9. [GGE] States should work to ensure the integrity of the supply chain so as to maintain confidence in the security of ICT products.

10. [GGE] States should prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions.

11. [GGE] States should encourage reporting of ICT vulnerabilities and the sharing of remedies for them.

12. [GGE] States should not knowingly attempt to harm the operations of a computer emergency  response team. Nor should it use such a team for malicious international activity.

13. [G7] No state should conduct or support ICT-enabled theft of intellectual property, trade secrets or other confidential business information for commercial gain.

14. [G7] If ICT activity amounts to the use of force (an armed attack), states can invoke Article 51 of the UN Charter in response.

15. [G7] States should collaborate on research and development on security, privacy and resilience.

16. [G7] States are encouraged to join the Budapest Convention.

• States should not create nor tolerate the dissemination of fake news.

 

IT Engineers Should

• Apply best practices in the design, implementation and testing of hardware and software products so as to

o Avoid ICT vulnerabilities,

o Protect user privacy and data

• Make use of the NIST “Framework for Improving Critical Infrastructure Cybersecurity” as a guide for improving the security of critical applications.

• Should not create nor use technology to create or disseminate fake news.

Business Firms and Business Leaders Should

• Take responsibility for handling sensitive corporate data stored electronically.

• Create employment criteria to ensure that employees are qualified to design and implement products and services that meet high security standards.

• Ensure that IT engineers are kept abreast of the latest ICT security threats.

• Implement effective Cyber Resilience in your business.

• Engage in information sharing of ICT hazards, subject to reasonable safeguards, with other companies in similar businesses.

Educators, Influencers/Institutions Should

• Teach the responsibilities of net citizens described above, including fostering good behavior and avoidance of malicious activity.

• Help global citizens to acquire the critical thinking skills needed to identify and avoid fake news and discourage its dissemination.

• Ensure that IT engineers are taught the skills necessary to produce safe, reliable and secure ICT products and services.

• Educate and lead global citizens to support and implement the ECCC.

• Create honors and awards to recognize outstanding individuals who contribute greatly to a secure and safe cyberspace.

Download Ethics Code of Conduct for Cyber Peace and Security (ECCC) here

 

The BGF-G7 Summit Initiative Report

The BGF-G7 Summit Initiative Report

Cyber Conflict and Fake News

Proposals for Consideration at G-7 Summit, Taormina, Italy, May 26-27, 2017

The Boston Global Forum herein submits policy proposals in two areas—cyber conflict and disinformation (fake news)—for consideration at the 2017 G-7 Summit in Taormina, Italy.

Contributors to this document are Nazli Choucri, Anders Corr, Michael Dukakis, Ryan Maness, Tuan Nguyen, Thomas Patterson, Derek S. Reveron, John E. Savage, and David Silbersweig.

Download BGF-G7 Summit Initiative Report here

 

PICTURE: BGF-G7 Summit Initiative Conference on April 25

PICTURE: BGF-G7 Summit Initiative Conference on April 25

CEO Nguyen Anh Tuan introduced and invited Chairman Michael Dukakis and Consul General of Italy in Boston Nicola De Santis.

 

Governor Michael Dukakis gives the Italian Consulate General in Boston the The Taormina Plan.

 

Governor Michael Dukakis Speech

 

The Consul-General Speech

 

The Consul-General Speech

 

Speaker: Mikko Hypponen at the Conference.

 

Prof. John Savage presenting The Taormina Plan

 

Prof. Thomas Patterson Speech

 

The BGF-G7 Summit Initiative Delegations

 

The BGF-G7 Summit Initiative Delegations

 

The BGF-G7 Summit Initiative Delegations