Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems

Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems, GAO-16-501: Published: May 18, 2016. Publicly Released: Jun 21, 2016. “In GAO’s survey of 24 federal agencies, the 18 agencies having high-impact systems identified cyber attacks from “nations” as the most serious and most frequently-occurring threat to the security of their systems. These agencies… Continue Reading

FBI – Business E-mail Compromise: The 3.1 Billion Dollar Scam

“This Public Service Announcement (PSA) is an update to the Business E-mail Compromise (BEC) information provided in Public Service Announcements (PSA) 1-012215-PSA and 1-082715a-PSA. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data. DEFINITION – BEC is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or… Continue Reading

IG – Audit Finds Inactive Accounts Within the Department of State’s Active Directory

OIG, U.S. Department of State, Management Assistance Report: Inactive Accounts Within the Department of State’s Active Directory, AUD-IT-16-37, Office of Audits. June 2016. “According to the National Institute of Standards and Technology, inactive accounts should be automatically disabled after a defined period of time. The Foreign Affairs Handbook states that Department officials must disable inactive… Continue Reading

NYT – A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet

Neil MacFarquar – Moscow – “A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab’s Moscow headquarters, where a small television screen displays cyberthreats occurring in real time around the world — a blinking, spinning, color-coded globe brimming with suspicious emails, malware and evil botnets that could be infecting a… Continue Reading

LeakedSource database of over 32 million leaked Twitter credentials

“LeakedSource is a search-engine capable of searching over 1.8 billion leaked records — an aggregation of data from hundreds of disparate sources. We have been able to accumulate this data over a relatively short period of time through a combination of deep-web scavenging and rumor-chasing. Occasionally these efforts lead to major discoveries…If we come across… Continue Reading

A Few Easy Steps Everyone Should Take to Protect Their Digital Privacy

Via ACLU – “Much of the privacy protection we need in today’s world can’t happen without technological and legislative solutions, and the ACLU will continue leading the fight for digital security and privacy through our litigation and advocacy efforts. But there are simple steps that everyone can take to improve their digital privacy. While there… Continue Reading

Learn how to fight fraud – at your library!

Carol Kando-Pineda – Counsel, FTC’s Division of Consumer & Business Education: …we have developed resources to address…needs for: people with challenges reading English, older patrons, Spanish-speakers, identity theft victims, new arrivals, and families looking to start a conversation with kids about digital literacy and living life online. Coming soon are tips and tools to address… Continue Reading

The Panama Papers: A Discussion of Some Ethical Issues

Follow up to previous posting, Panama Papers Database Goes Live, see McGee, Robert W., The Panama Papers: A Discussion of Some Ethical Issues (May 27, 2016). Available for download at SSRN: http://ssrn.com/abstract=2785954 “The Panama Papers refers to a massive leak of information encompassing more than 11 million documents involving more than 200,000 offshore entities. The… Continue Reading

OPM IG Report on Information Infrastructure Improvement Project

Second Interim Status Report on the U.S. Office of Personnel Management’s (OPM) Infrastructure Improvement Project – Major IT Business Case (Report No. 4A-CI-00-16-037).  May 18, 2016. “OPM has still not performed many of the critical capital project planning practices required by the Office of Management and Budget (OMB). Of primary concern, prior to initiating the… Continue Reading

Federal Acquisition Regulation – Basic Safeguarding of Contractor Information Systems

Final Rule by the Defense Department, the General Services Administration, and the National Aeronautics and Space Administration on 05/16/2016 – “DoD, GSA, and NASA are issuing a final rule amending the Federal Acquisition Regulation (FAR) to add a new subpart and contract clause for the basic safeguarding of contractor information systems that process, store or… Continue Reading

DHS IG Security Audit Security Identifies Workplace Violations

Information Technology Management Letter for the Office of Financial Management and Office of Chief Information Officer Components of the FY 2015 Department of Homeland Security Financial Statement Audit,May 6, 2016. “We recommend that OFM, in coordination with the DHS Chief Information Officer and Chief Financial Officer, make improvements to its financial management systems and associated… Continue Reading