The U.S. state and county governments are a bunch of sitting ducks.
Russia infamously attacked the U.S. presidential election in 2016 by hacking the voter database systems. And in a recent article about protecting the databases, Reuters profiled how U.S. Intelligence Officials and cybersecurity specialists plan to combat these hacks.
Ransomware has been the most prevalent and popular means to seize data and systems, and state and local governments have been the biggest target in these ransomware attacks.
Hackers have successfully infiltrated these systems and held them hostage in return for cryptocurrency in places such as Texas, Baltimore, and Atlanta. CISA (Cybersecurity Infrastructure Security Agency) is diligently working alongside election officials to protect their data and prevent ransomware attacks.
One reason why these ransomware attacks are abundant in state and local governments is that they actively add, remove, and change their data year-round. The constant activity leaves these municipalities exposed to corrupt hacker behavior. Local governments specifically do not have the resources to combat talented hackers. Another issue is that there is no status quo for local governments regarding how often they should create backups of their data.
So where do we go now? Is there any confidence that the FBI, CISA, or any other U.S. government agencies can prevent these malware attacks from happening? Officials are saying all the right things, but when push comes to shove, when will the next hack be?
Most likely the next database infiltration story will be coming to your morning news channel soon. The problem seems far from being solved.
Smart-web project Elastos could be the answer to all the state and local governments’ problems; its ecosystem is protected on numerous fronts.
The Elastos Runtime is a sandboxed close environment that runs on top of an existing OS (Android, iOS, Linux). It is not directly connected to the internet and closed off to the public with multiple C++ virtual machines running in the background.
Elastos also has a protected peer to peer network called Carrier. The Elastos Carrier manages network traffic in the ecosystem, providing a decentralized and serverless network. Since all data is stored locally, no hacker can infiltrate the system; this leaves data 100% protected.
Another important pillar of the Elastos network is the protection by Bitcoin’s hash power through merged-mining. Elastos is presently floating around 65% of Bitcoin’s hash power. This means that hackers would have to eclipse over 43 EH/s to break into the network.
Should this occur (highly improbable), hackers would then need to figure out a way to break into the Runtime environment and crack the Carrier P2P network that manages all the traffic. Sturdy roadblocks are in place to prevent these top-notch hackers from acquiring any data in the Elastos network.
The internet is flawed, and government officials are baffled by the avalanche of hacks aimed at important government entities. The Elastos infrastructure is close to completion and ready to be implemented for real-world use in the security spectrum.
When will the attacks end? It will all stop once governments, corporations, and businesses start incorporating a system that offers true protection of their data. Let’s stop being sitting ducks and start utilizing the next generation web (3.0) to secure databases and protect ourselves.
Welcome to the new internet.