Multistakeholder Process on Internet of Things Security Upgradability and Patching, 4861-4862 [2017-00817]
Download as PDF
sradovich on DSK3GMQ082PROD with NOTICES
Federal Register / Vol. 82, No. 10 / Tuesday, January 17, 2017 / Notices
Comments may also be submitted by
facsimile to (301) 713–0376, or by email
to NMFS.Pr1Comments@noaa.gov.
Please include the File No. in the
subject line of the email comment.
Those individuals requesting a public
hearing should submit a written request
to the Chief, Permits and Conservation
Division at the address listed above. The
request should set forth the specific
reasons why a hearing on the
application would be appropriate.
FOR FURTHER INFORMATION CONTACT:
Carrie Hubard or Shasta McClenahan,
(301) 427–8401.
SUPPLEMENTARY INFORMATION: The
subject permits are requested under the
authority of the Marine Mammal
Protection Act of 1972, as amended
(MMPA; 16 U.S.C. 1361 et seq.), the
regulations governing the taking and
importing of marine mammals (50 CFR
part 216), the Endangered Species Act of
1973, as amended (ESA; 16 U.S.C. 1531
et seq.), and the regulations governing
the taking, importing, and exporting of
endangered and threatened species (50
CFR 222–226).
Dr. Sharpe (File No. 19703) proposes
to study humpback and killer (Orcinus
orca) whales in Alaska using both vessel
and aerial surveys and a variety of
methods including photo-identification,
passive and active acoustics,
underwater video/photography,
unmanned aircraft systems, prey
mapping, and suction-cup tagging. The
purpose of the research is to continue a
long-term study of the behavior of
Alaskan humpback whales, focusing on
social structure, vocalizations, and
feeding. Forty harbor porpoises
(Phocoena phocoena), 50 Dall’s
porpoises (Phocoenoides dalli), 130
harbor seals (Phoca vitulina), and 80
Steller sea lions (Eumetopias jubatus)
may be incidentally harassed during
research activities. The permit would be
valid for five years.
Mr. Cilfone (File No. 20993) proposes
to film humpback whales in Hawaiian
waters of the Maui Nui Basin. Footage
would be used to create a film about
humpback whales and their
conservation success that would be
available on multiple platforms. Boats,
unmanned aircraft systems, pole
cameras, and snorkelers would all be
used to get footage. Fifty humpback
whales would be approached annually.
In addition, pantropical spotted
(Stenella attenuata), spinner (S.
longirostris), and bottlenose (Tursiops
truncatus) dolphins may be incidentally
harassed during filming operations.
Filming would occur in winter and
spring and the permit would be valid
until May 2017.
VerDate Sep<11>2014
18:21 Jan 13, 2017
Jkt 241001
In compliance with the National
Environmental Policy Act of 1969 (42
U.S.C. 4321 et seq.), an initial
determination has been made that the
activities proposed are categorically
excluded from the requirement to
prepare an environmental assessment or
environmental impact statement.
Concurrent with the publication of
this notice in the Federal Register,
NMFS is forwarding copies of the
applications to the Marine Mammal
Commission and its Committee of
Scientific Advisors.
Dated: January 10, 2017.
Julia Harrison,
Chief, Permits and Conservation Division,
Office of Protected Resources, National
Marine Fisheries Service.
4861
and Blueline Tilefish specifications
process, including recommendations by
the Council and its Scientific and
Statistical Committee (SSC).
Special Accommodations
This meeting is physically accessible
to people with disabilities. Requests for
sign language interpretation or other
auxiliary aids should be directed to M.
Jan Saunders, (302) 526–5251, at least 5
days prior to the meeting date.
Dated: January 11, 2017.
Jeffrey N. Lonergan,
Acting Deputy Director, Office of Sustainable
Fisheries, National Marine Fisheries Service.
[FR Doc. 2017–00818 Filed 1–13–17; 8:45 am]
BILLING CODE 3510–22–P
[FR Doc. 2017–00807 Filed 1–13–17; 8:45 am]
BILLING CODE 3510–22–P
DEPARTMENT OF COMMERCE
DEPARTMENT OF COMMERCE
National Telecommunications and
Information Administration
National Oceanic and Atmospheric
Administration
RIN 0648–XF161
Multistakeholder Process on Internet
of Things Security Upgradability and
Patching
AGENCY:
National Telecommunications
and Information Administration, U.S.
Department of Commerce.
ACTION: Notice of open meeting.
The Tilefish Advisory Panel
of the Mid-Atlantic Fishery
Management Council (Council) will
hold a meeting.
DATES: The meeting will be held on
Thursday, February 9, 2017, beginning
at 9 a.m. and conclude by 12 noon. For
agenda details, see SUPPLEMENTARY
INFORMATION.
ADDRESSES: The meeting will be held
via webinar with a telephone-only
connection option: https://
mafmc.adobeconnect.com/tile-ap-2017/.
Council address: Mid-Atlantic Fishery
Management Council, 800 N. State
Street, Suite 201, Dover, DE 19901;
telephone: (302) 674–2331 or on their
Web site at www.mafmc.org.
FOR FURTHER INFORMATION CONTACT:
Christopher M. Moore, Ph.D., Executive
Director, Mid-Atlantic Fishery
Management Council, telephone: (302)
526–5255.
SUPPLEMENTARY INFORMATION: The
purpose of the meeting is to create a
fishery performance report by the
Council’s Tilefish Advisory Panel. The
intent of this report is to facilitate a
venue for structured input from the
Advisory Panel members for the Golden
The National
Telecommunications and Information
Administration (NTIA) will convene a
virtual meeting of a multistakeholder
process concerning Internet of Things
Security Upgradability and Patching on
January 31, 2017.
DATES: The meeting will be held on
January 31, 2017, from 2:00 p.m. to 4:30
p.m., Eastern Time.
ADDRESSES: This is a virtual meeting.
NTIA will post links to online content
and dial-in information on the
multistakeholder process Web site at
https://www.ntia.doc.gov/otherpublication/2016/multistakeholderprocess-iot-security.
FOR FURTHER INFORMATION CONTACT:
Allan Friedman, National
Telecommunications and Information
Administration, U.S. Department of
Commerce, 1401 Constitution Avenue
NW., Room 4725, Washington, DC
20230; telephone: (202) 482–4281;
email: afriedman@ntia.doc.gov. Please
direct media inquiries to NTIA’s Office
of Public Affairs: (202) 482–7002; email:
press@ntia.doc.gov.
SUPPLEMENTARY INFORMATION:
Background: In March of 2015 the
National Telecommunications and
Information Administration issued a
Request for Comment to ‘‘identify
substantive cybersecurity issues that
Mid-Atlantic Fishery Management
Council (MAFMC); Public Meeting
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice; public meeting.
SUMMARY:
PO 00000
Frm 00024
Fmt 4703
Sfmt 4703
AGENCY:
SUMMARY:
E:\FR\FM\17JAN1.SGM
17JAN1
4862
Federal Register / Vol. 82, No. 10 / Tuesday, January 17, 2017 / Notices
sradovich on DSK3GMQ082PROD with NOTICES
affect the digital ecosystem and digital
economic growth where broad
consensus, coordinated action, and the
development of best practices could
substantially improve security for
organizations and consumers.’’ 1 We
received comments from a range of
stakeholders, including trade
associations, large companies,
cybersecurity startups, civil society
organizations and independent
computer security experts.2 The
comments recommended a diverse set of
issues that might be addressed through
the multistakeholder process, including
cybersecurity policy and practice in the
emerging area of Internet of Things
(IoT). On August 2, 2016, NTIA
announced that it would convene a new
multistakeholder process on security
upgradability and patching for
consumer IoT.3 NTIA subsequently
announced that the first meeting of this
process would be held on October 19,
2016.4
The matter of patching vulnerable
systems is now an accepted part of
cybersecurity.5 Unaddressed technical
flaws in systems leave the users of
software and systems at risk. The nature
of these risks varies, and mitigating
these risks requires various efforts from
the developers and owners of these
systems. One of the more common
means of mitigation is for the developer
or other maintaining party to issue a
security patch to address the
vulnerability. Patching has become
more commonly accepted, even for
consumers, as more operating systems
and applications shift to visible
reminders and automated updates. Yet
as one security expert notes, this
evolution of the software industry has
1 U.S. Department of Commerce, Internet Policy
Task Force, Request for Public Comment,
Stakeholder Engagement on Cybersecurity in the
Digital Ecosystem, 80 FR 14360, Docket No.
150312253–5253–01 (Mar. 19, 2015), available at:
https://www.ntia.doc.gov/files/ntia/publications/
cybersecurity_rfc_03192015.pdf.
2 NTIA has posted the public comments received
at https://www.ntia.doc.gov/federal-register-notice/
2015/comments-stakeholder-engagementcybersecurity-digital-ecosystem.
3 NTIA, Increasing the Potential of IoT through
Security and Transparency (Aug. 2, 2016), available
at: https://www.ntia.doc.gov/blog/2016/increasingpotential-iot-through-security-and-transparency.
4 NTIA, Notice of Multistakeholder Process on
Internet of Things Security Upgradability and
Patching Open Meeting (Sept. 15, 2016), available
at: https://www.ntia.doc.gov/federal-register-notice/
2016/10192016-meeting-notice-msp-iot-securityupgradability-patching.
5 See, e.g., Murugiah Souppaya and Karen
Scarfone, Guide to Enterprise Patch Management
Technologies, Special Publication 800–40 Revision
3, National Institute of Standards and Technology,
NIST SP 800–40 (2013) available at: https://
nvlpubs.nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-40r3.pdf.
VerDate Sep<11>2014
18:21 Jan 13, 2017
Jkt 241001
yet to become the dominant model in
IoT.6
To help realize the full innovative
potential of IoT, users need reasonable
assurance that connected devices,
embedded systems, and their
applications will be secure. A key part
of that security is the mitigation of
potential security vulnerabilities in IoT
devices or applications through
patching and security upgrades.
The ultimate objective of the
multistakeholder process is to foster a
market offering more devices and
systems that support security upgrades
through increased consumer awareness
and understanding. Enabling a thriving
market for patchable IoT requires
common definitions so that
manufacturers and solution providers
have shared visions for security, and
consumers know what they are
purchasing. Currently, no such
common, widely accepted definitions
exist, so many manufacturers struggle to
effectively communicate to consumers
the security features of their devices.
This is detrimental to the digital
ecosystem as a whole, as it does not
reward companies that invest in
patching, and it prevents consumers
from making informed purchasing
choices.
At the October 19, 2016, meeting,
stakeholders discussed the challenge of
patching, and how to scope the
discussion. Participants identified five
distinct work streams that could help
foster better security across the
ecosystem, and established working
groups to more fully evaluate options in
each of these areas.7 The main objective
of the January 31, 2016, meeting is to
share progress from the working groups
examining the five work streams, and
hear feedback from the broader
stakeholder community. Stakeholders
will also discuss overall progress on the
initiative, and identify any additional
work that may be needed.
More information about stakeholders’
work will be available at: https://
www.ntia.doc.gov/other-publication/
2016/multistakeholder-process-iotsecurity.
Time and Date: NTIA will convene a
virtual meeting of the multistakeholder
process on IoT Security Upgradability
and Patching on January 31, 2017, from
2:00 p.m. to 4:30 p.m., Eastern Time.
Please refer to NTIA’s Web site, https://
6 Bruce Schneier, The Internet of Things Is Wildly
Insecure—And Often Unpatchable, Wired (Jan. 6,
2014) available at: https://www.schneier.com/blog/
archives/2014/01/security_risks_9.html.
7 See NTIA, Multistakeholder Process; Internet of
Things (IoT) Security Upgradability and Patching,
at: https://www.ntia.doc.gov/other-publication/
2016/multistakeholder-process-iot-security.
PO 00000
Frm 00025
Fmt 4703
Sfmt 4703
www.ntia.doc.gov/other-publication/
2016/multistakeholder-process-iotsecurity, for the most current
information.
Place: This is a virtual meeting. NTIA
will post links to online content and
dial-in information on the
multistakeholder process Web site at
https://www.ntia.doc.gov/otherpublication/2016/multistakeholderprocess-iot-security.
Other Information: The meeting is
open to the public and the press. There
will be an opportunity for stakeholders
viewing the webcast to participate
remotely in the meetings through a
moderated conference bridge, including
polling functionality. Access details for
the meetings are subject to change.
Requests for a transcript of the meeting
or other auxiliary aids should be
directed to Allan Friedman at (202)
482–4281 or afriedman@ntia.doc.gov at
least seven (7) business days prior to
each meeting. Please refer to NTIA’s
Web site, https://www.ntia.doc.gov/
other-publication/2016/
multistakeholder-process-iot-security,
for the most current information.
Dated: January 11, 2017.
Kathy D. Smith,
Chief, National Telecommunications and
Information Administration.
[FR Doc. 2017–00817 Filed 1–13–17; 8:45 am]
BILLING CODE 3510–60–P
DEPARTMENT OF DEFENSE
Office of the Secretary
Charter Amendment of Department of
Defense Federal Advisory Committees
Department of Defense.
Amendment of Federal
Advisory Committee.
AGENCY:
ACTION:
The Department of Defense
(DoD) is publishing this notice to
announce that it is amending the charter
for the Advisory Committee on
Arlington National Cemetery.
FOR FURTHER INFORMATION CONTACT: Jim
Freeman, Advisory Committee
Management Officer for the Department
of Defense, 703–692–5952.
SUPPLEMENTARY INFORMATION: This
committee’s charter is being amended in
accordance with the Federal Advisory
Committee Act (FACA) of 1972 (5
U.S.C., Appendix, as amended) and 41
CFR 102–3.50(d). The amended charter
and contact information for the
Committee’s Designated Federal Officer
(DFO) can be obtained at https://
www.facadatabase.gov/.
The DoD is amending the charter for
the Advisory Committee on Arlington
SUMMARY:
E:\FR\FM\17JAN1.SGM
17JAN1
Agencies
[Federal Register Volume 82, Number 10 (Tuesday, January 17, 2017)]
[Notices]
[Pages 4861-4862]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2017-00817]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Telecommunications and Information Administration
Multistakeholder Process on Internet of Things Security
Upgradability and Patching
AGENCY: National Telecommunications and Information Administration,
U.S. Department of Commerce.
ACTION: Notice of open meeting.
-----------------------------------------------------------------------
SUMMARY: The National Telecommunications and Information Administration
(NTIA) will convene a virtual meeting of a multistakeholder process
concerning Internet of Things Security Upgradability and Patching on
January 31, 2017.
DATES: The meeting will be held on January 31, 2017, from 2:00 p.m. to
4:30 p.m., Eastern Time.
ADDRESSES: This is a virtual meeting. NTIA will post links to online
content and dial-in information on the multistakeholder process Web
site at https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security.
FOR FURTHER INFORMATION CONTACT: Allan Friedman, National
Telecommunications and Information Administration, U.S. Department of
Commerce, 1401 Constitution Avenue NW., Room 4725, Washington, DC
20230; telephone: (202) 482-4281; email: afriedman@ntia.doc.gov. Please
direct media inquiries to NTIA's Office of Public Affairs: (202) 482-
7002; email: press@ntia.doc.gov.
SUPPLEMENTARY INFORMATION: Background: In March of 2015 the National
Telecommunications and Information Administration issued a Request for
Comment to ``identify substantive cybersecurity issues that
[[Page 4862]]
affect the digital ecosystem and digital economic growth where broad
consensus, coordinated action, and the development of best practices
could substantially improve security for organizations and consumers.''
\1\ We received comments from a range of stakeholders, including trade
associations, large companies, cybersecurity startups, civil society
organizations and independent computer security experts.\2\ The
comments recommended a diverse set of issues that might be addressed
through the multistakeholder process, including cybersecurity policy
and practice in the emerging area of Internet of Things (IoT). On
August 2, 2016, NTIA announced that it would convene a new
multistakeholder process on security upgradability and patching for
consumer IoT.\3\ NTIA subsequently announced that the first meeting of
this process would be held on October 19, 2016.\4\
---------------------------------------------------------------------------
\1\ U.S. Department of Commerce, Internet Policy Task Force,
Request for Public Comment, Stakeholder Engagement on Cybersecurity
in the Digital Ecosystem, 80 FR 14360, Docket No. 150312253-5253-01
(Mar. 19, 2015), available at: https://www.ntia.doc.gov/files/ntia/publications/cybersecurity_rfc_03192015.pdf.
\2\ NTIA has posted the public comments received at https://www.ntia.doc.gov/federal-register-notice/2015/comments-stakeholder-engagement-cybersecurity-digital-ecosystem.
\3\ NTIA, Increasing the Potential of IoT through Security and
Transparency (Aug. 2, 2016), available at: https://www.ntia.doc.gov/blog/2016/increasing-potential-iot-through-security-and-transparency.
\4\ NTIA, Notice of Multistakeholder Process on Internet of
Things Security Upgradability and Patching Open Meeting (Sept. 15,
2016), available at: https://www.ntia.doc.gov/federal-register-notice/2016/10192016-meeting-notice-msp-iot-security-upgradability-patching.
---------------------------------------------------------------------------
The matter of patching vulnerable systems is now an accepted part
of cybersecurity.\5\ Unaddressed technical flaws in systems leave the
users of software and systems at risk. The nature of these risks
varies, and mitigating these risks requires various efforts from the
developers and owners of these systems. One of the more common means of
mitigation is for the developer or other maintaining party to issue a
security patch to address the vulnerability. Patching has become more
commonly accepted, even for consumers, as more operating systems and
applications shift to visible reminders and automated updates. Yet as
one security expert notes, this evolution of the software industry has
yet to become the dominant model in IoT.\6\
---------------------------------------------------------------------------
\5\ See, e.g., Murugiah Souppaya and Karen Scarfone, Guide to
Enterprise Patch Management Technologies, Special Publication 800-40
Revision 3, National Institute of Standards and Technology, NIST SP
800-40 (2013) available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r3.pdf.
\6\ Bruce Schneier, The Internet of Things Is Wildly Insecure--
And Often Unpatchable, Wired (Jan. 6, 2014) available at: https://www.schneier.com/blog/archives/2014/01/security_risks_9.html.
---------------------------------------------------------------------------
To help realize the full innovative potential of IoT, users need
reasonable assurance that connected devices, embedded systems, and
their applications will be secure. A key part of that security is the
mitigation of potential security vulnerabilities in IoT devices or
applications through patching and security upgrades.
The ultimate objective of the multistakeholder process is to foster
a market offering more devices and systems that support security
upgrades through increased consumer awareness and understanding.
Enabling a thriving market for patchable IoT requires common
definitions so that manufacturers and solution providers have shared
visions for security, and consumers know what they are purchasing.
Currently, no such common, widely accepted definitions exist, so many
manufacturers struggle to effectively communicate to consumers the
security features of their devices. This is detrimental to the digital
ecosystem as a whole, as it does not reward companies that invest in
patching, and it prevents consumers from making informed purchasing
choices.
At the October 19, 2016, meeting, stakeholders discussed the
challenge of patching, and how to scope the discussion. Participants
identified five distinct work streams that could help foster better
security across the ecosystem, and established working groups to more
fully evaluate options in each of these areas.\7\ The main objective of
the January 31, 2016, meeting is to share progress from the working
groups examining the five work streams, and hear feedback from the
broader stakeholder community. Stakeholders will also discuss overall
progress on the initiative, and identify any additional work that may
be needed.
---------------------------------------------------------------------------
\7\ See NTIA, Multistakeholder Process; Internet of Things (IoT)
Security Upgradability and Patching, at: https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security.
---------------------------------------------------------------------------
More information about stakeholders' work will be available at:
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security.
Time and Date: NTIA will convene a virtual meeting of the
multistakeholder process on IoT Security Upgradability and Patching on
January 31, 2017, from 2:00 p.m. to 4:30 p.m., Eastern Time. Please
refer to NTIA's Web site, https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security, for the most current
information.
Place: This is a virtual meeting. NTIA will post links to online
content and dial-in information on the multistakeholder process Web
site at https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security.
Other Information: The meeting is open to the public and the press.
There will be an opportunity for stakeholders viewing the webcast to
participate remotely in the meetings through a moderated conference
bridge, including polling functionality. Access details for the
meetings are subject to change. Requests for a transcript of the
meeting or other auxiliary aids should be directed to Allan Friedman at
(202) 482-4281 or afriedman@ntia.doc.gov at least seven (7) business
days prior to each meeting. Please refer to NTIA's Web site, https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security, for the most current information.
Dated: January 11, 2017.
Kathy D. Smith,
Chief, National Telecommunications and Information Administration.
[FR Doc. 2017-00817 Filed 1-13-17; 8:45 am]
BILLING CODE 3510-60-P