Data Privacy Day

January 28, 2020

In a 2019 interview with ABC News, Apple CEO Tim Cook said, “The people who track on the internet know a lot more about you than if somebody’s looking in your window. A lot more.”

We’re not sure about you, but we don’t want anyone looking in our window!

In honor of Data Privacy Day on January 28, we’re bringing you some educational resources about data privacy. According to Stay Safe Online, millions of people are uneducated about how their information is being used and shared. Its website says Data Privacy Day is meant to “inspire dialogue” about data sharing and educate those who might not know the extent to which their information is being collected.

While technology becomes more sophisticated, companies are becoming better at gathering data, which makes for a scary combination. Even if you think you’re taking all the right steps to being safe online, we encourage you to read on.

You might not specifically add your birthday or place of work to your Facebook profile. But, did you know that information may very well still be collected from photos or posts? Not to mention, even more specific personal details about your life, such as where you’ve been on vacation, what music you like to listen to, and even where you’ve gone during the day, can also be collected. A New York Times article called “Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret” explains that apps are often misleading when they prompt people to give location permission. “An app may tell users that granting access to their location will help them get traffic information, but not mention that the data will be shared and sold,” the article reads. Yes, that means the locations of everywhere you go – your Doctor’s office, your kid’s school, and even your home – can be shared.

If the thought of someone virtually following you home wasn’t enough, here are a few statistics about data privacy that might surprise you

  • 21% of online users are the victim of account hacking, including hacked email and social media accounts
  • 11% of online users have been the victim of data theft, including stolen credit card information, bank account numbers, and social security numbers
  • 41% of children ages 8–17 have public profiles, which is an open invitation for predators

So what can you do to avoid someone looking in your virtual window? Start educating yourself and those around you with these Federal publications about online safety.

Social Media: The Fastest Growing Vulnerability to the Air Force Mission explains how social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. This paper includes recommendations of the best practice for safe cyberspace operations. If you are a member of the Air Force, check out this publication for staying safe on social media and protecting your critical missions.

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition from the Department of the Army and Strategic Studies Institute is a report that provides cyberspace decision-makers with a more comprehensive, clearer description of what cyberspace is and how the government can improve upon cybersecurity. The report offers recommendations on dealing with cyberspace. It has three parts: the first focuses on cyberspace; the second focuses on the types of threats that have become prevalent; and the third covers possible responses to these threats.

Children are some of the most vulnerable to online threats and dangers to privacy. Educate your children early and often about online safety. Net Cetera: Chatting With Kids About Being Online from the Federal Trade Commission is here to help you do it. The guide provides parents with tips on talking to their children about using computers, smart phones, and other mobile devices and apps and tells adults what they can do to monitor their children’s devices. It also provides parents tips on telling their children how to recognize whether or not they’re receiving inappropriate content as well as how to create secure passwords and protect their personal information.

Our personal information is much more valuable than we realize! If you’re passionate about protecting your personal data, be sure to check out these Federal publications at the GPO Bookstore.

The GPO Online Bookstore – Easy Access to Federal Publications

HOW DO I OBTAIN THESE RESOURCES?

Sign up to receive promotional bulletin emails from the US Government Online Bookstore.

Shop Online Anytime: You can buy a vast majority of eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at https://bookstore.gpo.gov.

Visit our Retail Store: To buy or order a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 8 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up(s).

Order by Phone or Email: Call our Customer Contact Center Monday through Friday, 8 am to 4:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.  Email orders to ContactCenter@gpo.gov

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

Find more than a million official Federal Government publications from all three branches at www.govinfo.gov.

About the author: Blogger contributor Cat Goergen is the PR Specialist in GPO’s Public Relations office.


Addressing the Cyber Crisis

October 10, 2017

Not a day goes by without articles across the media landscape announcing a database security break-in, a new form of computer hacking often from a distant nation, compromises in personal financial information, or one of America’s credit bureaus losing control of its data security infrastructure.

The US Government Online Bookstore has put together a collection of publications focusing on Cyber Security and Infrastructure, featuring federal publications that deal with this serious condition that has the potential of breaking down telecommunications, energy, and financial transactions of nations, even on a global scale.

Here is just a small sampling of the titles now available online to help Americans better understand the threat, and what you can do to combat it on a personal level.

Cyber Infrastructure Protection: Volume III. This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition. This report is intended to provide cyberspace decision-makers with a more comprehensive, clearer description of cyberspace, which they can use to manage and make decisions about cyberspace programs to improve the effectiveness of government in this critically important area.

NATO Cyberspace Capability: A Strategic and Operational Evolution. This monograph examines the past and current state of NATO’s cyberspace defense efforts by assessing the appropriateness and sufficiency of them to address anticipated threats to member countries, including the United States. This analysis focuses on the recent history of NATOs cyberspace defense efforts and how changes in NATOs strategy and policy writ large embrace the emerging nature of cyberspace for military forces, as well as other elements of power.

We encourage you to go to https://bookstore.gpo.gov and review the interesting and insightful collection of cyber related titles now available.

The GPO Online Bookstore – Easy Access to Federal Publications

HOW DO I OBTAIN THESE RESOURCES?

Shop Online Anytime: You can buy eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at https://bookstore.gpo.gov.

Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.

Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

About the author: Blogger contributor Ed Kessler is a Promotions Specialist in GPO’s Publication and Information Sales program office.


Fraud Awareness: Fighting cybercrime and other fraud-related issues

August 13, 2015

The hack of the Office of Personnel Management Web site revealed personnel records and security-clearance files of federal employees and contractors that exposed sensitive information. About 22.1 million people were affected by the breach, which included not only federal employees and contractors, but their families and friends as well.

It is timely to note that National Fraud Awareness Week occurs this month. Fraud-fighting professionals from around the world convene to inform people about the threat of phone, internet, and mail fraud for in home and at the workplace. These professionals share tips for employers and employees equally to stay secure and protect their sensitive information.

Ponzimonium_CoverGPO’s online bookstore has several books that can also benefit and educate people on fraud awareness. For instance, “Ponzimonium: How Scam Artists Are Ripping Off America” is an eBook that tells compelling stories about actual U.S. Commodity Futures Trading Commission (CFTC) cases stemming from investigations that began with the economic downturn. These are real cases, real fraudsters, with unfortunately, very real victims.

9780160927492Another useful book that GPO has is the “2014 The FBI Story.” This book features an annual collection of news and feature articles from the FBI website and shows the agency’s most successful 2014 investigations and operations. It also covers an array of cases involving high profile crimes dealing with sex trafficking, serial killers, gangs, scams, frauds, and cybercrime.

With all the scams that are going around, hopefully everyone will take full advantage of these resources. Be mindful of the sites you give your personal information out to. Also remember, if it sounds too good to be true, it probably is.

How do I obtain these resources?

Shop Online Anytime: You can buy eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at http://bookstore.gpo.gov.

Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.

Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

About the author: Epiphany Barnes is a Summer Intern in GPO’s  Publication and Information Sales office.


Lessons in Global Security – Part 2

May 11, 2015

SSI_logoAbout this blog post series: In this two-part blog post, we review new publications from the U.S. Army War College, Strategic Studies Institute (SSI). As in “Lessons in Global Security – Part 1,” in this post, we continue our focus on SSI publications covering U.S. national security, public policy, and international relations topics. (Permission granted for use of Strategic Studies Institute-United States Army War College logo)

 The Saudi-Iranian Rivalry and the Future of Middle East Security

008-000-01076-5This monograph reviews the outlook of the Middle Eastern countries, including Saudi Arabia, Iran, Iraq, Egypt, Kuwait, Bahrain, Yemen, Libya, Lebanon, Israel, and Syria. Of these, Iran and Saudi Arabia are becoming the two behemoth forces in the Middle East. While Saudi Arabia has most control over Gulf-area Arab states and is a close ally with the United States, Iran’s closest Arab allies are Syria and the Palestinian territories that support Hamas and Hezbollah. The author presents several conclusions and recommendations for the U.S. policymakers to consider, emphasizing strategic interests as a way to bolster peaceful negotiations with Middle Eastern states, rather than persistent conflict over reform and democracy.

Recent newsworthy events relating to U.S. and Saudi relationship can be found in this article here:

http://abcnews.go.com/International/wireStory/kerry-hopes-win-pause-yemen-war-heads-talks-30839695

(Image is copyright-free from Yalibnan.com)

(Image is copyright-free from Yalibnan.com)

With the current events tie-in, these titles may be appropriate for high school global history classes as well as for university students with coursework relating to international relations and foreign policy arms control.

Legality in Cyberspace: An Adversary View

008-000-01108-7This Letort Papers series title highlights the differences in interpretation between the Euro-Atlantic nations compared to China and Russia’s views of international law in relation to cyberspace activity, including cybersecurity attacks, cyber warfare, and cyber weapons. The authors explore this issue from the Russian perspective to analyze and examine the legal status of various activities in cyberspace, including what constitutes a hostile activity.   The authors adequately present each side of the argument and confirm that to date an agreement on this expanding field of conflict has not yet been met.

US Army Cyber Command image

(Image compliments of US Army Cyber Command website http://www.arcyber.army.mil/)

Within the conclusion section, the authors present implications for U.S. policy makers to consider; including taking a closer observation of how Russia defines cyber warfare and information weapons.   After U.S. policymakers have determined Russian’s interpretations, they may be better equipped to strategizing their defense.

Students participating in cybersecurity and foreign policy programs may be interested in this text. Additionally, students pursuing a law degree may find this text informative for international law classes. Political scientists, diplomats, international law attorneys, intelligence community teams, and military strategists should keep this text on their bookshelf for referral for guidance about complex negotiations.

Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications

008-000-01094-3This unclassified monograph examines past and present joint and Army cyberspace military operations, as well as how these operations may fit into the complex and dynamic sphere of international deterrence and escalation. It provides information about the founding and responsibilities of the military units that comprise the U.S. Cyber Command for offensive and defensive initiatives with network operations for protection of the U.S. Department of Defense (DOD) global information grid.   Primarily, these operations were developed to provide a deterrence to a nuclear threat, prior to the 21st century. Now these defenses are used to influence national response across the intelligence community and law enforcement as a method for deterrence and escalation to possibly reduce risk.

Military science and cyberspace or cybersecurity students may be interested in this text. Additionally, U.S. military personnel, U.S. international community, law enforcement, and historians may find this book useful in their operations.

(Image compliments of US Army Cyber Command website http://www.arcyber.army.mil/)

(Image compliments of US Army Cyber Command website http://www.arcyber.army.mil/)

The US Government Bookstore is receiving new print titles on a weekly basis from the US Army War College, Strategic Studies Institute, so please check for future available titles on the topics of U.S. national and global security, cyberspace capabilities, combatting terrorism, and political science issues, such as international relations and foreign diplomacy, that will be added to this growing collection at this link: http://bookstore.gpo.gov/agency/1609

How can I get these new SSI publications?

Shop Online Anytime: You can buy the following  publications (with FREE Standard Shipping worldwide) from the U.S. Government Online Bookstore website at http://bookstore.gpo.gov:

Order by Phone: You may also Order print editions by calling our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.

Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

About the author: This week’s blog contributor is Maureen Whelan, Senior Marketing Team Leader for GPO’s Publication and Information Sales program office in Washington, DC. Maureen oversees print and digital content dissemination strategy and manages third party free and paid content distribution through platforms and vendors, such as Apple iBookstore, Barnes and Noble.com, Google Play eBookstore, Ebscohost databases, Overdrive, and more.


%d bloggers like this: