recommended reading

State Department Looks After the Next Cyber Threat: Africa

GrandeDuc/Shutterstock.com

The federal government increasingly is concentrating diplomatic efforts on protecting Americans from hackers, but less is said about foreign allies who are equally mobile and even more vulnerable. Now, the State Department is paying attention.

In emerging economies -- which depend on inexpensive smartphones for everything from banking to crime-fighting -- network security is almost an afterthought.

Today, "due diligence" is one of State's top priorities, Thomas Dukes, senior adviser for the department’s Office of the Cyber Coordinator, said Tuesday. Foreign Service professionals will help developing nations strengthen their communications infrastructure. 

India, South Africa and other emerging nations potentially pose a cyber threat to themselves, and, to some degree, global networks that are interconnected. 

In March, Agence France-Presse reported: “Hackers have claimed the scalp of the South African Ministry of State Security’s Twitter account, underlining concerns that Africa may be the soft underbelly of global cyber security.”  During that incident, attackers merely usurped the @StateSecurityRS account to advertise a “miracle diet” and then officials were able to change the password to regain control.

But cybersecurity officials fear the next attack on an African government could be more insidious. “It wouldn’t be hard to shut down the government,” Craig Rosewarne, founder of South African-based consulting firm Wolfpack Information Risk, told AFP. “There’s very little in place, so even the most basic of attacks, in most cases, get through.” Most developing African nations have been either unwilling or unable to protect networks against the growing menaces of cybercrime and domestic hacktivism, the report said. 

State has begun bilateral engagement with Brazil, India, South Africa, and even alleged cyberspy China, on the cyber issue, Dukes said at a Georgetown University conference on international computer security risks. "Those are countries that are leaders of the developing world and countries where we think it is very important to identify the things that we agree upon and don't agree upon," he said. 

(Image via GrandeDuc/Shutterstock.com)

Threatwatch Alert

Stolen laptop

Wireless Heart Monitor Maker to Pay $2.5M Settlement to HHS After Laptop Stolen

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.