Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Guide to Cyber Threat 6 Information Sharing (Draft) – NIST

NIST Special Publication 800-150 (Draft) Guide to Cyber Threat Information Sharing (Draft). Chris Johnson, Lee Badger, David Waltermire – Computer Security Division – Information Technology Laboratory, October 2014: “In today’s active threat environment, incident detection and response is an ongoing challenge for many organizations. This publication assists organizations in establishing computer security incident response capabilities that leverage the collective knowledge, experience, and abilities of their partners by actively sharing threat intelligence and ongoing coordination. This publication provides guidelines for coordinated incident handling, including producing and consuming data, participating in information sharing communities, and protecting incident-related data.”

Pew Report – Cyber Attacks Likely to Increase

Cyber Attacks Likely to Increase BY LEE RAINIE, JANNA ANDERSON AND JENNIFER CONNOLLY “The Internet has become so integral to economic and national life that government, business, and individual users are targets for ever-more frequent and threatening attacks. In the 10 years since the Pew Research Center and Elon University’s Imagining the Internet Center first asked expertsContinue Reading

California Data Breach Report

Kamala D. Harris, Attorney General, California Department of Justice, October 2014 “California is the birthplace of the digital revolution that has transformed nearly every aspect of the world in which we live. Yet even as technological innovation and advances bring us greater convenience, efficiency, and productivity, they are also generating new vulnerabilities. The Internet has created aContinue Reading

JPMorgan Data Breach Involves Information on 76 Million Households

JPMorgan Data Breach Involves Information on 76 Million Households, 7 Million Small Businesses, CRS Legal Sidebar, October 23, 2014 “JPMorgan did not provide individual customers with notice of the breach because it believed that it had no obligation to do so because no “sensitive customer information” was involved in the data breach. This means thatContinue Reading

National Strategy for Trusted Identities in Cyberspace

Helping individuals and organizations utilize secure, efficient, easy-to-use and interoperable identity credentials to access online services in a manner that promotes confidence, privacy, choice and innovation. The NSTIC calls for a vibrant Identity Ecosystem where identity solutions adhere to four Guiding Principles: Identity solutions will be privacy-enhancing and voluntary Identity solutions will be secure and resilientContinue Reading

Bitcoin over Tor isn’t a good idea – Paper

Paper by Alex Biryukov, Ivan Pustogarov “Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research shows that this level ofContinue Reading

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

CRS – Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws. Charles Doyle, Senior Specialist in American Public Law. October 15, 2014. “The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes  computer systems. It is a cyber security law. It protects federal computers, bank computers, and computersContinue Reading

Security – a perpetual war: lessons from nature

Via Cornell University Library – Security – a perpetual war: lessons from nature, Wojciech Mazurczyk, Elżbieta Rzeszutko (Submitted on 17 Oct 2014) “For ages people have sought inspiration in nature. Biomimicry has been the  propelling power of such inventions, like Velcro tape or “cat’s eyes” – retroreflective road marking. At the same time, scientists have been developing biologicallyContinue Reading

Understand the Cost of Cyber Security Crime

HP Report – Cyber Crime Costs Continue to Grow: “Cyber crimes are growing more common, more costly, and taking longer to resolve. Those are among the findings of the fifth annualCost of Cyber Crime Study conducted by the respected Ponemon Institute on behalf of HP Enterprise Security. The 2014 global study of U.S.-based companies, which spannedContinue Reading

Is Your Company Ready for a Big Data Breach?

The Second Annual Study on Data Breach Preparedness – Ponemon Institute© Research Report – Sponsored by Experian® Data Breach Resolution – Independently conducted by Ponemon Institute LLC. Publication Date: September 2014. “Data breaches are increasing in frequency. Forty-three percent of respondents say their companies had a data breach involving the loss or theft of more than 1,000 records, anContinue Reading

Taking Steps to Improve Federal Information Security

Beth Cobert, Deputy Director for Management at the Office of Management and Budget  “In a rapidly changing technological environment, we must have robust procedures, policies, and systems in place to protect our nation’s most sensitive information. Growing cybersecurity threats make it ever more important for the Federal government to maintain comprehensive information security controls to assessContinue Reading

Hackers’ Attack Cracked 10 Companies in Major Assault – NYT

By MATTHEW GOLDSTEIN, NICOLE PERLROTH and DAVID E. SANGER “The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse. Questions over who the hackers are and the approach of their attack concern government and industry officials.Continue Reading