{"id":18291,"date":"2022-02-16T06:33:24","date_gmt":"2022-02-16T14:33:24","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/16\/news-12024\/"},"modified":"2022-02-16T06:33:24","modified_gmt":"2022-02-16T14:33:24","slug":"news-12024","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/16\/news-12024\/","title":{"rendered":"The US Watches Warily for Russia-Ukraine Tensions to Spill Over"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/620bcf977d11d746344b5936\/master\/pass\/Science_Ukraine_GettyImages-1231220523.jpg\"\/><\/p>\n<p><strong>Credit to Author: Garrett M. Graff| Date: Tue, 15 Feb 2022 17:10:41 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/garrett-m-graff\">Garrett M. Graff<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">As Russian troops<\/span> remain amassed on Ukraine\u2019s border, the possibility looms that tensions may spill over to a cyberattack with international consequences. If so, the first sign to the US government will likely come in a Slack message read at Eric Goldstein\u2019s desk in a generic office building in Ballston, Virginia.<\/p>\n<p class=\"paywall\">Goldstein oversees the Joint Cyber Defense Collaborative, launched last year to provide what the agency calls \u201cvisibility at scale\u201d over US network and private sector critical infrastructure. That means CISA may be on the front lines of any escalation by Russia that ripple all the way to the US homeland. Officials and private sector leaders are hurriedly patching, preparing, and war-gaming in case Russia decides to launch direct attacks against US infrastructure, unleash a <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">flood of disruptive ransomware<\/a>, or aim a <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-destructive-cyberattacks-ransomware-data-wiper\/\">tailored cyberattack against Ukraine<\/a> that spills over into US networks.<\/p>\n<p class=\"paywall\">The JCDC is so new that it still only exists virtually and hasn\u2019t yet moved into its physical space in CISA\u2019s offices in northern Virginia. It\u2019s meant to serve as something like a unified command center for US internet infrastructure, bringing together nearly two dozen private sector security and network firms; today, its Slack channel includes companies like Cloudflare, CrowdStrike, Mandiant, Microsoft, Verizon, Google Cloud, and Amazon Web Services. In addition to CISA, the NSA, the FBI, and US Cyber Command representatives are participating on the government side.<\/p>\n<p class=\"paywall\">The collaboration center gives network monitors a place and community to quickly identify and share odd happenings, potential breaches, and suspicious activity. It confronted its first crisis in early December, with news of vulnerabilities in the <a href=\"https:\/\/www.wired.com\/story\/log4j-flaw-hacking-internet\/\">widely used logging library Log4j<\/a>. At the time, CISA director Jen Easterly called the vulnerability the \u201c<a data-offer-url=\"https:\/\/www.cnbc.com\/video\/2021\/12\/16\/cisa-director-says-the-log4j-security-flaw-is-the-most-serious-shes-seen-in-her-career.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnbc.com\/video\/2021\/12\/16\/cisa-director-says-the-log4j-security-flaw-is-the-most-serious-shes-seen-in-her-career.html&quot;}\" href=\"https:\/\/www.cnbc.com\/video\/2021\/12\/16\/cisa-director-says-the-log4j-security-flaw-is-the-most-serious-shes-seen-in-her-career.html\" rel=\"nofollow noopener\" target=\"_blank\">most serious<\/a>\u201d she\u2019d seen in her entire career, and the group moved quickly to confront it\u2014convening on a Saturday to discuss the initial dangers and by Monday launching a comprehensive <a data-offer-url=\"https:\/\/github.com\/cisagov\/log4j-affected-db\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/github.com\/cisagov\/log4j-affected-db&quot;}\" href=\"https:\/\/github.com\/cisagov\/log4j-affected-db\" rel=\"nofollow noopener\" target=\"_blank\">GitHub page<\/a> to coordinate mitigation efforts.<\/p>\n<p class=\"paywall\">Now, just weeks later, the US government and the Biden administration\u2019s cyber team face another serious risk as the White House warns of a possible Russian invasion of Ukraine\u2014an event that many in private industry and Western governments worry could spill over, purposely or accidentally, to computer networks far from any Eastern European battlefield. \u201cWe hope to leverage the muscle memory that we&#x27;ve created through Log4j to apply to potential activity coming out of the Russia-Ukraine crisis,\u201d says Easterly, who spoke with WIRED late last week in her first extended public comments on the looming war.<\/p>\n<p class=\"paywall\">Even as they\u2019ve warned of an increasing chance of war, officials in the US and UK have been careful to state that they don\u2019t see specific threats. They\u2019re instead expressing a generalized unease at Russia\u2019s geopolitical recklessness and its history of nefarious cyber activity, as well as the sheer complexity and connectedness of digital ecosystems.<\/p>\n<p class=\"paywall\">\u201cThere are currently no specific credible threats to the US homeland coming out of this particular Russia-Ukraine crisis, but we are very mindful of the potential for Russia to consider escalating in destabilizing ways that may impact others outside of Ukraine,\u201d Easterly says. \u201cGiven how the US and our partners may react to an invasion, we\u2019re also very mindful of the connectivity of infrastructure around the world and that you might have cascading impacts that may be either intended or unintended.\u201d<\/p>\n<p class=\"paywall\">Friday night, hours after White House national security advisor Jake Sullivan warned that the US believes a Russian invasion may be imminent and after the State Department urged all US citizens to evacuate Ukraine, CISA launched a new website, called <a data-offer-url=\"https:\/\/www.cisa.gov\/shields-up\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/shields-up&quot;}\" href=\"https:\/\/www.cisa.gov\/shields-up\" rel=\"nofollow noopener\" target=\"_blank\">Shields Up<\/a>, that warns about the rising threat of Russian hostilities affecting the online ecosystem. This follows similar efforts by the <a data-offer-url=\"https:\/\/www.ncsc.gov.uk\/guidance\/actions-to-take-when-the-cyber-threat-is-heightened\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ncsc.gov.uk\/guidance\/actions-to-take-when-the-cyber-threat-is-heightened&quot;}\" href=\"https:\/\/www.ncsc.gov.uk\/guidance\/actions-to-take-when-the-cyber-threat-is-heightened\" rel=\"nofollow noopener\" target=\"_blank\">UK government<\/a> and other European nations to prepare for the effects a Russian war may bring to countries beyond Ukraine\u2019s borders.<\/p>\n<p class=\"paywall\">The Shields Up moniker builds on a unique and colorful online superhero persona Easterly has created since she was confirmed by the US Senate last summer as CISA\u2019s second-ever director. Her Twitter profile picture is a comic book-style drawing of her dressed as a superhero in a cape and bodysuit emblazoned with CISA\u2019s logo. In what was surely a first for a senior US government official, Easterly appeared at a Black Hat keynote last summer wearing dragon pants and a \u201cfree Britney\u201d T-shirt and solved a Rubik\u2019s Cube behind her back while she spoke. In announcing the new website, Easterly tweeted, \u201cALL organizations must adopt a heightened posture of vigilance. The time to act is NOW. We\u2019re urging all orgs to put #ShieldsUp.\u201d<\/p>\n<p class=\"paywall\">\u201cYou might have cascading impacts that may be either intended or unintended.\u201d<\/p>\n<p class=\"paywall\">Jen Easterly, CISA director<\/p>\n<p class=\"paywall\">The Shields Up push is the latest in a flurry of US government activity since the new year warning private industry to prepare for spillover effects if the situation in Ukraine continues to deteriorate. Behind the scenes, the FBI has increased its reporting tempo on suspicious cyber events and urged US industry to share more information about attacks, probes, and phishing campaigns spotted on individual networks. The White House\u2019s National Security Council, under the auspices of deputy national security advisor for cyber and emerging technologies Anne Neuberger, convened a closed-door meeting on January 31 with industry partners to warn of possible Russian escalation.<\/p>\n<p class=\"paywall\">The efforts are part of a governmentwide push that started almost as soon as US intelligence began warning of increased Russian buildups along the Ukrainian border in December. \u201cWe started leaning really far forward on this around late 2021,\u201d Easterly says. \u201cWe began a pretty deliberate outreach campaign, providing classified TS-level [top-secret] information down to the unclassified level to ensure that all of our industry partners were aware of potential risk, and then talking through key mitigations and steps that they should take.\u201d<\/p>\n<p class=\"paywall\">Neuberger says the administration is keenly focused on three specific interrelated efforts: Working with Ukraine to shore up its own cyber defenses, working with European allies and partners\u2014like NATO\u2014to shore up Western defenses and coordinate any potential response to further Russian aggression, as well as shoring up cybersecurity defenses domestically. \u201cThe White House has been coordinating the interagency to ensure that we are postured to react quickly to any eventuality, both within the government and with our private sector partners,\u201d Neuberger says, referring to the formal National Security Council process that brings together different arms of the government.<\/p>\n<p class=\"paywall\">Neuberger herself traveled to Europe early this month to meet with cyber-focused counterparts in Brussels and at NATO, then journeyed to Warsaw to meet with Polish and Baltic cybersecurity officials; she also met with representatives from what are known as \u201cB9\u201d nations, the NATO nations that make up the security alliance\u2019s Eastern flank, closest to Russia. In each meeting, the theme was the same: <em>How can Western nations be better prepared for a coordinated response to cyber aggression from Russia?<\/em><\/p>\n<p class=\"paywall\">\u201cThe Russians have used cyber as a key component of their force projection over the last decade, including previously in Ukraine,\u201d Neuberger says. \u201cThe Russians understand that disabling or destroying critical infrastructure\u2014including power and communications\u2014can augment pressure on a country\u2019s government, military, and population and accelerate their acceding to Russian objectives.\u201d<\/p>\n<p class=\"paywall\">In recent weeks, nearly every corner of the US government has been brought to bear on that same question: The Transportation Security Administration, which oversees pipeline security, in addition to its better-known role of passenger screening at airports, has issued directives to pipeline companies; the Environmental Protection Agency has recently hosted two webinars for more than 400 water utilities about necessary security steps; and the Department of Energy held comparable, CEO-level briefings for energy companies.<\/p>\n<p class=\"paywall\">More public-facing government efforts have come in the form of a mid-January <a data-offer-url=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/01\/11\/cisa-fbi-and-nsa-release-cybersecurity-advisory-russian-cyber\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/01\/11\/cisa-fbi-and-nsa-release-cybersecurity-advisory-russian-cyber&quot;}\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/01\/11\/cisa-fbi-and-nsa-release-cybersecurity-advisory-russian-cyber\" rel=\"nofollow noopener\" target=\"_blank\">advisory<\/a> from CISA, the NSA, and the FBI outlining common tactics and techniques for Russian cyber operations, ranging from preferred Cisco routers to Microsoft Exchange vulnerabilities. Last week, those agencies issued another joint advisory, along with international counterparts from Australia and the UK highlighting the proliferation of ransomware attacks against critical infrastructure in 2021. While the advisory never specifically mentions Russia, many of the worst attacks of 2021 stemmed from <a href=\"https:\/\/www.wired.com\/story\/russia-revil-ransomware-arrests-ukraine\/\">Russia-based groups like REvil<\/a>.<\/p>\n<p class=\"paywall\">Russia has long treated its neighbor Ukraine as a real-world sandbox in which to test cyberattacks. In 2015, Russia <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">brought down the country\u2019s power grid<\/a>. In 2017, it set loose the <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">NotPetya ransomware<\/a>, which corrupted Ukrainian tax software and went on to cause as much as $10 billion in damage to international companies that did business in the country. The shipping company Maersk saw some 80,000 computers destroyed; FedEx suffered nearly half a billion dollars in damage; and drug company Merck saw upwards of $800 million in losses.<\/p>\n<p class=\"paywall\">A more recent attack came in mid-January, as dozens of Ukraine government websites were knocked offline and defaced, replacing the sites with text that warned, \u201cBe afraid and expect the worst.\u201d While that attack may have originated from Russian ally Belarus, <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-destructive-cyberattacks-ransomware-data-wiper\/\">subsequent destructive malware hit Ukrainian systems, posing as ransomware but deleting data<\/a>. US officials have also warned of \u201c<a data-offer-url=\"https:\/\/www.cnn.com\/2022\/02\/12\/politics\/us-security-intelligence-prep-russian-hacking-threats\/index.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2022\/02\/12\/politics\/us-security-intelligence-prep-russian-hacking-threats\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2022\/02\/12\/politics\/us-security-intelligence-prep-russian-hacking-threats\/index.html\" rel=\"nofollow noopener\" target=\"_blank\">specific, credible<\/a>\u201d threats against Ukraine\u2019s critical infrastructure. On Tuesday, an apparent DDoS attack <a data-offer-url=\"https:\/\/www.facebook.com\/StratcomCentreUA\/posts\/290808713119116\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/StratcomCentreUA\/posts\/290808713119116&quot;}\" href=\"https:\/\/www.facebook.com\/StratcomCentreUA\/posts\/290808713119116\" rel=\"nofollow noopener\" target=\"_blank\">hit<\/a> the websites of Ukraine&#x27;s Ministry of Defense, Armed Forces, and two major banks, although it&#x27;s unclear who&#x27;s responsible.<\/p>\n<p class=\"paywall\">The US government has long been intimately involved in helping understand and mitigate Ukraine\u2019s cyber risk, collaboration that it hopes will also help it understand and mitigate threats to the homeland. US Cyber Command has conducted what it calls \u201c<a data-offer-url=\"https:\/\/www.cyberscoop.com\/cyber-command-midterm-elections-ukraine-montenegro-and-north-macedonia\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cyberscoop.com\/cyber-command-midterm-elections-ukraine-montenegro-and-north-macedonia\/&quot;}\" href=\"https:\/\/www.cyberscoop.com\/cyber-command-midterm-elections-ukraine-montenegro-and-north-macedonia\/\" rel=\"nofollow noopener\" target=\"_blank\">hunt-forward<\/a>\u201d missions in Ukraine, deploying teams to the country to search for malware as part of a strategy known as \u201cpersistent engagement,\u201d developed by <a href=\"https:\/\/www.wired.com\/story\/general-paul-nakasone-cyber-command-nsa\/\">its commander, general Paul Nakasone<\/a>, in an effort to keep the US in constant contact with its primary adversaries in the most active arenas in cyberspace.<\/p>\n<p class=\"paywall\">On the civilian side, CISA works closely with Ukrainian cybersecurity agencies, and the US Agency for International Development has for years run <a data-offer-url=\"https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRFJ.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRFJ.pdf&quot;}\" href=\"https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRFJ.pdf\" rel=\"nofollow noopener\" target=\"_blank\">large-scale<\/a>, <a data-offer-url=\"https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRB8.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRB8.pdf&quot;}\" href=\"https:\/\/pdf.usaid.gov\/pdf_docs\/PA00XRB8.pdf\" rel=\"nofollow noopener\" target=\"_blank\">multimillion-dollar programs<\/a> to help Ukraine protect its own critical infrastructure against cyberattacks. \u201cWe&#x27;ve also more recently, as you can imagine, been communicating with CERT-Ukraine to provide reports of possible activity targeting Ukrainian organizations, including Ukrainian government agencies,\u201d Easterly says, referring to the country\u2019s computer emergency response team. \u201cWe are standing in to be able to be helpful for them.\u201d<\/p>\n<p class=\"paywall\">Conversations in recent weeks with more than a dozen senior cybersecurity leaders across the US government, tech companies, and the private sector\u2014many of whom asked to speak anonymously in order to candidly discuss a dynamic threat environment\u2014outlined major areas of risk they\u2019re collectively watching, as Russia has already demonstrated a sometimes brutal effectiveness online.<\/p>\n<p class=\"paywall\">While many expect Russia to deploy information operations regionally, including disinformation and perhaps even hack-and-leak operations similar to those it used to target the 2016 US presidential elections, the two leading threats are a scourge of ransomware and so-called collateral damage. \u201cLooking back at NotPetya, that\u2019s a huge cautionary tale,\u201d Easterly says, pointing to the many US companies or Western subsidiaries that do business in Ukraine and thus have interlocked digital systems.<\/p>\n<p class=\"paywall\">Few officials believe Russia would purposefully target US networks, at least at the start of any campaign against Ukraine, and think Russia would only do so if the US or NATO dramatically escalated a Ukraine conflict. They note that Russian state actors, unlike those in North Korea or Iran, have never deliberately carried out destructive cyberattacks on US infrastructure or companies.<\/p>\n<p class=\"paywall\">\u201cWe believe the threshold [for direct action] is very high,\u201d one senior US government official says, echoing a <a data-offer-url=\"https:\/\/www.cnn.com\/2022\/01\/24\/politics\/russia-cyberattack-warning-homeland-security\/index.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2022\/01\/24\/politics\/russia-cyberattack-warning-homeland-security\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2022\/01\/24\/politics\/russia-cyberattack-warning-homeland-security\/index.html\" rel=\"nofollow noopener\" target=\"_blank\">DHS advisory<\/a> from mid-January.<\/p>\n<p class=\"paywall\">Even if Russia chooses to act against the US directly, Michael Daniel, the one-time White House cyber coordinator for President Obama and now head of the industry group Cyber Threat Alliance, says his member companies anticipate that any such attacks against US networks would be \u201cpainful but reversible.\u201d That means targeting noncritical networks like billing systems or supply chains, rather than central infrastructure. Such attacks can still lead to dangerous and disruptive unintended consequences; last year&#x27;s ransomware attack on Colonial Pipeline led the company to voluntarily shut off its major East Coast gas pipeline as it dealt with the impact on noncore systems.<\/p>\n<p class=\"paywall\">\u201cRussia always surprises me with its willingness to cross red lines,\u201d says John Hultquist, vice president of intelligence analysis at the security firm Mandiant.<\/p>\n<p class=\"paywall\">Perhaps most likely is a scenario that officials described variously as \u201cransomware with extreme prejudice\u201d or \u201cunleashing the beast of their criminal actors.\u201d In that instance, the notoriously permissive Russian government would free or encourage the criminal groups within its borders to unleash epidemics of ransomware on Western networks in an attempt to discourage or distract the US or NATO from intervening to aid Ukraine.<\/p>\n<p class=\"paywall\">Officials are forthright, though, that the greatest challenge in preparing for a digital spillover from Ukrainian battlefields is hardly novel for cybersecurity: There are so many targets\u2014and not much time. Whether in Ukraine, Europe, or the United States, officials are confronting a patchwork of privately and publicly owned infrastructure, much of it outdated and long underfunded when it comes to security. \u201cSignificant improvements in resilience don\u2019t happen in weeks,\u201d one official noted, and officials have long struggled to cajole private-sector companies to embrace stronger security measures.<\/p>\n<p class=\"paywall\">\u201cIn the physical world, we have security baselines\u2014seatbelts and airbags in our cars, speed limits on our roads, alarm systems and locks in our homes and offices. In the digital world, we don\u2019t have this built-in security, but we are focused on building it urgently,\u201d Neuberger says. \u201cRequiring and building in these cybersecurity foundations for all of our critical infrastructure is the most important line of effort we can take as a nation to strengthen our resilience against cyberattacks.\u201d<\/p>\n<p class=\"paywall\">Whatever may unfold in the next few weeks\u2014US officials have said they believe Putin may launch a full-scale Ukraine invasion as early as Wednesday, there have been signs that Russia may ultimately scale back\u2014the JCDC\u2019s ability to respond will be a key test of Easterly\u2019s vision to turn CISA into the \u201cfront door for government,\u201d the first place where private sector companies turn for cybersecurity information and collaboration.<\/p>\n<p class=\"paywall\">\u201cWhat I get paid to do is to ensure that we are reducing risk to our digital and physical infrastructure,\u201d she says. \u201cGiven the fact that the government doesn\u2019t own the vast majority of that infrastructure, it\u2019s ensuring that our partners have the information and the actionable guidance they need to keep their businesses up and running.\u201d<\/p>\n<p class=\"paywall\">For now, CISA and the rest of the US government will wait to see what this week brings.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-cyberattacks-spillover\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/620bcf977d11d746344b5936\/master\/pass\/Science_Ukraine_GettyImages-1231220523.jpg\"\/><\/p>\n<p><strong>Credit to Author: Garrett M. Graff| Date: Tue, 15 Feb 2022 17:10:41 +0000<\/strong><\/p>\n<p>Conversations with more than a dozen senior cybersecurity leaders in both the public and private sector outline the major areas of risk.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21465],"class_list":["post-18291","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-national-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18291"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18291\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}