A bill introduced by three senior senators would require the White House to develop a strategy to ensure the security of 5G wireless systems and infrastructure, but would also block the executive branch from recommending that 5G or subsequent generations of mobile communications infrastructure be “nationalized” by the government – a possibility that has been floated in recent weeks by an official connected with the Trump campaign organization. […]

A bipartisan group of senators urged Trump administration officials in a letter dated today to ban the use of inverter equipment made by China-based Huawei from the U.S. electric grid, citing the same cybersecurity concerns that led Congress to block Huawei network equipment from the U.S. market because of firm’s alleged links to Chinese intelligence services.






[…]

Department of Homeland Security DHS

A new bill introduced by Sens. John Cornyn, R-Texas, Patrick Leahy, D-Vt., and Ted Cruz, R-Texas, would push the Department of Homeland Security (DHS) to work with the National Cybersecurity Preparedness Consortium (NCPC), an association of university-based training organizations, to improve cybersecurity training for state and local governments.






[…]

Capital, House of Representatives, Congress, Senate

Sen. John Cornyn, R-Texas, today introduced the Advancing Cybersecurity Diagnostics and Mitigation Act in the Senate. The House version of the bill (HR 6443), sponsored by Rep. John Ratcliffe, R-Texas, passed the House earlier this month.






[…]

President Donald Trump signed the Providing Resources, Officers, and Technology to Eradicate Cyber Threats to (PROTECT) Our Children Act of 2017, which reauthorizes the National Internet Crimes Against Children Task Force Program through 2022.






[…]

An effort to block or delay changes to Rule 41 of the Federal Rules of Criminal Procedure failed to pass the Senate floor, causing the changes to the rule to go into effect on Dec. 1. The changes will allow law enforcement to obtain warrants to search computers in an unknown location and to search any device that the hacker has broken into, potentially granting access to multiple privately owned computers with one warrant.






[…]

Categories