	{"id":9883,"date":"2013-01-22T11:29:58","date_gmt":"2013-01-22T19:29:58","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=9883"},"modified":"2013-04-03T11:50:59","modified_gmt":"2013-04-03T18:50:59","slug":"changes-in-government-information-sharing-help-protect-us-all","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/","title":{"rendered":"Changes in Government Information Sharing Help Protect Us All"},"content":{"rendered":"<p>There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national boundaries when it comes to information-sharing, and they\u2019re not bound by copyright law that keeps them from swapping code samples or by ethics in disclosing details of vulnerabilities. Without getting into the argument over whether the \u201cgood guys\u201d should throw off the gauntlets and \u201cplay dirty\u201d (would they even be good guys if they played dirty?), there are plenty of things we can do to share information and analyze data that don\u2019t fall afoul of any laws or rules of ethics.<\/p>\n<p>One of the complaints that I have often heard when speaking with data security people at large companies is that coming up with Return On Investment (or ROI) data to plead their case for more security funding can be incredibly difficult &#8212; there&#8217;s just not a lot of info out there. Many companies fear releasing details of security breaches, as it can be incredibly damaging to brand loyalty or it could lead to lawsuits or fines against the company. But by sharing details of breaches, it improves information so that other companies can better assess their own level of risk and prepare appropriately. And it can also be used to help law enforcement track, identify, and prosecute cybercriminals.<\/p>\n<p>From an everyday user perspective, when companies share data, they\u2019re less likely to accidentally leak their customers&#8217; (your!) data and more cybercriminals can be caught and stopped. That\u2019s a big improvement for all of us.\u00a0<a href=\"http:\/\/www.itproportal.com\/2013\/01\/21\/eu-to-punish-firms-who-fail-to-share-cybercrime-data\/\">Recently proposed European Union legislation<\/a> could make a big change in that regard &#8212; companies would be required to report breach data or face fines. <a href=\"http:\/\/www.ncsl.org\/issues-research\/telecom\/security-breach-notification-laws.aspx\">Most states in the US<\/a> have enacted similar legislation already, but other countries have resisted such changes because it requires a fairly thorough examination of related issues, and there is fear that the legislation could lead to class action lawsuits and other things that might push businesses elsewhere. This article about the <a href=\"http:\/\/www.mallesons.com\/publications\/marketAlerts\/2012\/Pages\/Mandatory-data-security-breach-reporting-in-Australia---discussion-paper-seeks-views-by-23-November-2012.aspx\">discussion of similar legislation in Australia<\/a> gives a good idea of what concerns need to be addressed.<\/p>\n<p>The EU and US governments have also recently agreed to share data about cross-border crimes that involve online fraud, phishing, and child pornography. Many cybercrime rings are international, which can make finding and prosecuting criminals incredibly difficult. This agreement will increase the pool of data law enforcement agents can use to identify cybercrime groups; rather than looking at small islands of what may appear to be unrelated incidents, with more data they can see patterns that indicate coordinated cybercrime efforts.<\/p>\n<p>From a security wonk perspective, this is very exciting. The more cooperation we have within industries like law enforcement agencies, ISPs, Domain Name Registrars, banks, security vendors, and even private citizens, as well as between those different industries, the more we can better protect ourselves and successfully go after bad guys. Of all the cybercriminals that have been brought to justice, not one arrest has been made without the cooperation of companies, affected individuals, and law enforcement. The bad guys will always be a step ahead if they\u2019re willing to share and the rest of us are not.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/wbeem\/6976328515\/\">wbeem<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national boundaries when it comes to information-sharing, and they\u2019re not bound by copyright law that keeps them from swapping code samples or by ethics in disclosing details of vulnerabilities. Without [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9895,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[291,289,231],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changes in Government Information Sharing Help Protect Us All - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-22T19:29:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-03T18:50:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/\",\"name\":\"Changes in Government Information Sharing Help Protect Us All - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage\"},\"datePublished\":\"2013-01-22T19:29:58+00:00\",\"dateModified\":\"2013-04-03T18:50:59+00:00\",\"description\":\"There\\u2019s a significant difference between the capabilities of the \\u201cgood guys\\u201d and the \\u201cbad guys\\u201d when it comes to cybercrime. The bad guys have no national\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Changes in Government Information Sharing Help Protect Us All\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Changes in Government Information Sharing Help Protect Us All\",\"datePublished\":\"2013-01-22T19:29:58+00:00\",\"dateModified\":\"2013-04-03T18:50:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage\"},\"wordCount\":553,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg\",\"keywords\":[\"Cybercrime\",\"Government\",\"Information Security\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/","og_locale":"en_US","og_type":"article","og_title":"Changes in Government Information Sharing Help Protect Us All - The Mac Security Blog","og_description":"There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national","og_url":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-01-22T19:29:58+00:00","article_modified_time":"2013-04-03T18:50:59+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/","name":"Changes in Government Information Sharing Help Protect Us All - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage"},"datePublished":"2013-01-22T19:29:58+00:00","dateModified":"2013-04-03T18:50:59+00:00","description":"There\u2019s a significant difference between the capabilities of the \u201cgood guys\u201d and the \u201cbad guys\u201d when it comes to cybercrime. The bad guys have no national","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Changes in Government Information Sharing Help Protect Us All"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Changes in Government Information Sharing Help Protect Us All","datePublished":"2013-01-22T19:29:58+00:00","dateModified":"2013-04-03T18:50:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#webpage"},"wordCount":553,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg","keywords":["Cybercrime","Government","Information Security"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/changes-in-government-information-sharing-help-protect-us-all\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/government-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2zp","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9883"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=9883"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9883\/revisions"}],"predecessor-version":[{"id":9903,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9883\/revisions\/9903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9895"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=9883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=9883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=9883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}