Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Presidential Policy Directive – United States Cyber Incident Coordination

PRESIDENTIAL POLICY DIRECTIVE/PPD-41 SUBJECT: United States Cyber Incident Coordination, July 26, 2016

“The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that enables these benefits is vulnerable to malicious activity, malfunction, human error, and acts of nature, placing the Nation and its people at risk. Cyber incidents are a fact of contemporary life, and significant cyber incidents are occurring with increasing frequency, impacting public and private infrastructure located in the United States and abroad. United States preparedness efforts have positioned the Nation to manage a broad range of threats and hazards effectively. Every day, Federal law enforcement and those agencies responsible for network defense in the United States manage, respond to, and investigate cyber incidents in order to ensure the security of our information and communications infrastructure. The private sector and government agencies have a shared vital interest in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences. The nature of cyberspace requires individuals, organizations, and the government to all play roles in incident response. Furthermore, effective incident response efforts will help support an open, interoperable, secure, and reliable information and communications infrastructure that promotes trade and commerce, strengthens international security, fosters free expression, and reinforces the privacy and security of our citizens. While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors….”

Report – Mitigating the Cybersecurity Skills Shortage

Mitigating the Cybersecurity Skills Shortage – Top Insights and Actions from Cisco Security Advisory Services “Increasingly sophisticated threat campaigns. High-profile data breaches. Determined threat actors. The sophistication of the technology and tactics used by criminals has outpaced the ability of IT and security professionals to address these threats. Security Magazine reports that “most organizations do… Continue Reading

Report by 3 companies – Cyber resiliency in the Fourth Industrial Revolution

Cyber resiliency in the Fourth Industrial Revolution – A roadmap for global leaders facing emerging cyber threats “The First Industrial Revolution, in the late 18th century, was driven largely by steam engines. The second, in the late 19th century, introduced mass production and the division of labor. The third, in the late 20th century, involved… Continue Reading

Global Commission on Internet Governance Final Report

“The Global Commission on Internet Governance was established in January 2014 to articulate and advance a strategic vision for the future of Internet governance. The project conducts and supports independent research on Internet-related dimensions of global public policy.” “Half of the world’s population now uses the Internet to connect, communicate and interact. But basic access… Continue Reading

2016 How Google Fights Piracy Report

Via Google Public Policy Blog: “The internet continues to be a boon for creators, their communities, and the content industry. At Google, we are committed to helping these industries flourish online. Today, Google’s services provide content for people all around the world and generate significant revenue for rightsholders. YouTube alone has now generated over $2… Continue Reading

ACI – Globally, Nearly 1 in 3 Consumers Victimized by Card Fraud

“Thirty percent of consumers globally have experienced card fraud in the past five years, according to new global benchmark data from ACI Worldwide and Aite Group. The global fraud study of more than 6,000 consumers across 20 countries revealed that, compared to ACI’s 2014 benchmark study, card fraud rates—unauthorized activity on three types of payment… Continue Reading

Guidance on cyber resilience for financial market infrastructures

“The Committee on Payments and Market Infrastructures (CPMI) and the International Organization of Securities Commissions (IOSCO) have published the Guidance on cyber resilience for financial market infrastructures (“Cyber Guidance”). This builds on an earlier version of the report that underwent a three-month public consultation. The safe and efficient operation of financial market infrastructures (FMIs) is… Continue Reading

Leakedsource collects hacked data from across the globe

Follow up to previous posting on this database – Leakedsource – “There are currently 1,933,304,758 accounts in our database” – users may search by term or type. Via ET Tech – “If you have an account online regardless of the country you reside in, chances are you have been hacked or will be hacked at… Continue Reading

GAO Reports – 2020 Census, Defense Headquarters, Registering Voters, FOIA, ID Fraud

2020 Census: Census Bureau Needs to Improve Its Life-Cycle Cost Estimating Process, GAO-16-628: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution, GAO-16-652R: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Improved Data Needed to Better Identify Streamlining… Continue Reading

KSN Report: Ransomware in 2014-2016 The evolution of the threat and its future

Kaspersky Lab, June 22, 2016: “Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely… Continue Reading

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to… Continue Reading

GAO – IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program

Identity Theft and Tax Fraud: IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program, GAO-16-508: Published: May 24, 2016. Publicly Released: Jun 23, 2016. “Taxpayer Protection Program (TPP). While the Internal Revenue Service (IRS) has made efforts to strengthen TPP—a program to authenticate the identities of suspicious tax return filers and prevent… Continue Reading