Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Health Care and Cyber Security: Increasing Threats Require Increased Capabilities

KPMG – “Four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyber-attacks. At the core of the increased risk to healthcare organizations is the richness and uniqueness of the information that the health plans, doctors, hospitals and other providers handle. Apart from typical financial fraud, there is also the possibility of medical insurance fraud, or, in the case of providers, attacks on computer-controlled medical devices. As this is the largest part of the U.S. economy and a safeguard of peoples’ well-being, healthcare is a matter of national security. Despite such significant repercussions of a cyber-attack, the healthcare sector lags in terms of its preparedness for cyber threats. As recent events have made clear, protecting information is not easy. Hackers will find opportunities to exploit flaws in the way healthcare organizations currently fund, manage, enable, organize and implement their information protection capabilities. In terms of technical capabilities, the healthcare industry is behind other industries in protecting its infrastructure and electronic protected health information (ePHI) – as commonly seen in the use of outdated clinical technology, insecure network-enabled medical devices, and an overall lack of information security management processes…”

EY, LANL make new cybersecurity tools available to private sector

News release: “Ernst & Young LLP and Los Alamos National Laboratory have formed a strategic alliance to deliver some of the most advanced behavioral cybersecurity tools available to the commercial market. “Cybersecurity attacks are ever more frequent and more sophisticated, and they destroy the trust needed to conduct business,” said Duncan McBranch, Chief Technology OfficerContinue Reading

Appeals Court Upholds FTC’s Data Security Authority

EPIC – “A federal appeals court ruled that the Federal Trade Commission can enforce data security standards. In FTC v. Wyndham, the agency sued Wyndham hotels after the company exposed financial data of hundreds of thousands of customers. The company argued that the FTC lacked authority to enforce security standards, but the court disagreed. EPICContinue Reading

FCW obtained official timeline of OPM data breach

FCW.com: “An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data and the government’s step-by-step response. It illuminates a sequence of events that lawmakers have struggled to pin down in public hearings with Obama administration officials. The timeline makes clear that the heist of dataContinue Reading

Mandatory Minimum Sentencing: Federal Aggravated Identity Theft

CRS report vai FAS – Mandatory Minimum Sentencing: Federal Aggravated Identity Theft – Charles Doyle, Senior Specialist in American Public Law. August 20, 2015. “Aggravated identity theft is punishable by a mandatory minimum sentence of imprisonment for two years or by imprisonment for five years if it relates to a terrorism offense. At least thusContinue Reading

How Victims Can Regain Control Mitigate Threats in Wake of OPM Breach

 “In June 2015, the Nation learned that the personnel records of 21.5 million United States citizens had been exfiltrated by an unknown adversary from the Office of Personnel Management, one of the largest known breaches in the history of the U.S. Government.  The immediate public outcry included congressional hearings attributing the breach to OPM administrators andContinue Reading

Invincea 1H 2015 Advanced Endpoint Threat Report

Nextgov: “Malicious code Russians reportedly used to jimmy open a White House network and malware Chinese hackers reportedly used to rupture insurer Anthem’s network were similar — and free, according to new research…The Anthem hackers compromised the Social Security numbers and other personal information of about 80 million customers. The White House hackers infiltrated anContinue Reading

Binaryedge Report – more than petabyte of data on unsecured servers

Via Digital Guardian – “The research firm Binaryedge says it found more than a petabyte of data stored in high performance databases like MongoDB is exposed to the public Internet.”

Another Snowden Reveal – Telecom Giant Provides Massive Data Pipeline to NSA

NYT and ProPublica investigative reports: “The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newlyContinue Reading

Homeland Security Advisory Council-New Tasking

August 14, 2015 Federal Register Notice: “The Secretary of the Department of Homeland Security (DHS), Jeh Johnson, tasked his Homeland Security Advisory Council to establish a subcommittee entitled Cybersecurity Subcommittee on August 6, 2015. The Cybersecurity Subcommittee will provide findings and recommendations to the Homeland Security Advisory Council on best practices sourced from industry, stateContinue Reading

Not Even Close: The State of Computer Security (with slides) – James Mickens

“In this bleak, relentlessly morbid talk, James Mickens will describe why making computers secure is an intrinsically impossible task. He will explain why no programming language makes it easy to write secure code. He will then discuss why cloud computing is a black hole for privacy, and only useful for people who want to fillContinue Reading

Cyber crimes against NATO and its members

Via Atlantic Council – New Twists in Russia’s Cyber Campaign Against NATO and Its Members By Sam Jones, Financial Times: “Russia’s aggressive actions in cyber space are all carefully designed to fall short of warranting any kind of serious military or aggressive response. One of Moscow’s new favoured tactics is to arm crime syndicates withContinue Reading