{"id":525,"date":"2021-03-15T13:43:08","date_gmt":"2021-03-15T13:43:08","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=525"},"modified":"2021-03-15T13:43:08","modified_gmt":"2021-03-15T13:43:08","slug":"white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/","title":{"rendered":"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks"},"content":{"rendered":"<p class=\"css-axufdj evys1bk0\">The sophisticated hacks pulled off by Russia and China against a broad array of government and industrial targets in the United States \u2014 and the failure of the intelligence agencies to detect them \u2014 are driving the Biden administration and Congress to rethink how the nation should protect itself from growing cyberthreats.<\/p>\n<p class=\"css-axufdj evys1bk0\">Both hacks exploited the same gaping vulnerability in the existing system: They were launched from inside the United States \u2014 on servers run by Amazon, GoDaddy and smaller domestic providers \u2014 putting them out of reach of the early warning system run by the National Security Agency.<\/p>\n<p class=\"css-axufdj evys1bk0\">The agency, like the C.I.A. and other American intelligence agencies, is prohibited by law from conducting surveillance inside the United States, to protect the privacy of American citizens.<\/p>\n<p class=\"css-axufdj evys1bk0\">But the F.B.I. and Department of Homeland Security \u2014 the two agencies that can legally operate inside the United States \u2014 were also blind to what happened, raising additional concerns about the nation\u2019s capacity to defend itself from both rival governments and nonstate attackers like criminal and terrorist groups.<\/p>\n<p class=\"css-axufdj evys1bk0\">The sophisticated hacks pulled off by Russia and China against a broad array of government and industrial targets in the United States \u2014 and the failure of the intelligence agencies to detect them \u2014 are driving the Biden administration and Congress to rethink how the nation should protect itself from growing cyberthreats.<\/p>\n<p class=\"css-axufdj evys1bk0\">Both hacks exploited the same gaping vulnerability in the existing system: They were launched from inside the United States \u2014 on servers run by Amazon, GoDaddy and smaller domestic providers \u2014 putting them out of reach of the early warning system run by the National Security Agency.<\/p>\n<p class=\"css-axufdj evys1bk0\">The agency, like the C.I.A. and other American intelligence agencies, is prohibited by law from conducting surveillance inside the United States, to protect the privacy of American citizens.<\/p>\n<p class=\"css-axufdj evys1bk0\">But the F.B.I. and Department of Homeland Security \u2014 the two agencies that can legally operate inside the United States \u2014 were also blind to what happened, raising additional concerns about the nation\u2019s capacity to defend itself from both rival governments and nonstate attackers like criminal and terrorist groups.<\/p>\n<p>Source: New York Times<\/p>\n<p><a href=\"https:\/\/www.nytimes.com\/2021\/03\/14\/us\/politics\/us-hacks-china-russia.html\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The sophisticated hacks pulled off by Russia and China against a broad array of government and industrial targets in the United States \u2014 and the failure of the intelligence agencies to detect them \u2014 are driving the Biden administration and Congress to rethink how the nation should protect itself from growing cyberthreats. Both hacks exploited [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":153,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community\" \/>\n<meta property=\"og:description\" content=\"The sophisticated hacks pulled off by Russia and China against a broad array of government and industrial targets in the United States \u2014 and the failure of the intelligence agencies to detect them \u2014 are driving the Biden administration and Congress to rethink how the nation should protect itself from growing cyberthreats. Both hacks exploited [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-15T13:43:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/\",\"name\":\"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg\",\"datePublished\":\"2021-03-15T13:43:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/","og_locale":"en_US","og_type":"article","og_title":"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community","og_description":"The sophisticated hacks pulled off by Russia and China against a broad array of government and industrial targets in the United States \u2014 and the failure of the intelligence agencies to detect them \u2014 are driving the Biden administration and Congress to rethink how the nation should protect itself from growing cyberthreats. Both hacks exploited [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-03-15T13:43:08+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/","name":"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg","datePublished":"2021-03-15T13:43:08+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/dark-computer-green-software-225769.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/white-house-weighs-new-cybersecurity-approach-after-failure-to-detect-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"White House Weighs New Cybersecurity Approach After Failure to Detect Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=525"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/525\/revisions"}],"predecessor-version":[{"id":526,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/525\/revisions\/526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/153"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}