Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

GAO Reports – Critical Infrastructure Protection, Drug Control, Indian Energy, Post 9/11 GI Bill, Unaccompanied Alien Children

Critical Infrastructure Protection: Cybersecurity of the Nation’s Electricity Grid Requires Continued Attention, GAO-16-174T: Published: Oct 21, 2015. Publicly Released: Oct 21, 2015. Drug Control: Additional Performance Information Is Needed to Oversee the National Guard’s State Counterdrug Program, GAO-16-133: Published: Oct 21, 2015. Publicly Released: Oct 21, 2015. Indian Energy Development: Actions Needed to Address BIAContinue Reading

Facebook – Notifications for targeted attacks

October 16, 2015 – Alex Stamos is the Chief Security Officer at Facebook. “The security of people’s accounts is paramount at Facebook, which is why we constantly monitor for potentially malicious activity and offer many options to proactively secure your account. Starting today, we will notify you if we believe your account has been targetedContinue Reading

EU Report – The challenge of resilience in a globalised world

The challenge of resilience in a globalised world. Joint Research Centre. EUR 27280 EN. Report by the Joint Research Centre the European Commission’s in-house science service. “…[this] Directorate-General Joint Research Centre Resilience Report is the first-ever attempt to deepen our knowledge and develop a holistic approach by analysing various strategies for building resilience in theContinue Reading

The Hidden Data Economy

The Marketplace for Stolen Digital Information – McAfee – This report was researched and written by: Charles McFarland, François Paget, Raj Saman. Raj Samani, CTO of Intel Security for Europe, the Middle East, and Africa: “Data is the “oil” of the digital economy. The commercial market for personal data is booming, with large databases ofContinue Reading

Final Report of Defense Science Board 2012 Summer Study on Strategic Surprise

Via FAS: Office of the Secretary of Defense, February 26, 2015 – Memorandum for Chairman, Defense Science Board / Subject: Final Report of the Defense Science Board 2012 Summer Study on Strategic Surprise “The final report of the Defense Science Board 2014 Summer Study on Strategic Surprise is attached. In accordance with its charter, theContinue Reading

The Rise and Impact of Digital Amnesia

Kaspersky Lab – Why we need to protect what we no longer remember – “Key findings from the study include: • Across the United States, the study shows that an overwhelming number of consumers can easily admit their dependency on the Internet and devices as a tool for remembering. Almost all (91.2%) of those surveyed agreed that they use the Internet as anContinue Reading

GAO Reports – Diplomatic Security, Maritime Cybersecurity, Space Situational Awareness, USAID

Diplomatic Security: Options for Locating a Consolidated Training Facility, GAO-16-139T: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015. Maritime Critical Infrastructure Protection: DHS Needs to Enhance Efforts to Address Port Cybersecurity, GAO-16-116T: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015. Space Situational Awareness: Status of Efforts and Planned Budgets, GAO-16-6R: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015.Continue Reading

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist, September 8, 2015. “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic orContinue Reading

Victims of Identity Theft, 2014

Victims of Identity Theft, 2014 – Erika Harrell, Ph.D., – BJS Statistician “An estimated 17.6 million persons, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014, the Bureau of Justice Statistics (BJS) announced today. These statistics were similar to those inContinue Reading

GAO – Agencies Need to Correct Weaknesses and Fully Implement Security Program

Federal Information Security: Agencies Need to Correct Weaknesses and Fully Implement Security Programs, GAO-15-714: Published: Sep 29, 2015. Publicly Released: Sep 29, 2015. “Persistent weaknesses at 24 federal agencies illustrate the challenges they face in effectively applying information security policies and practices. Most agencies continue to have weaknesses in (1) limiting, preventing, and detecting inappropriateContinue Reading

Mozilla Cybersecurity Delphi 1.0: Towards a user-centric policy framework

“From compromises of some of the world’s largest corporations, to critical vulnerabilities in widely used open source software, to exponential growth in the number of connected devices and users, the need to proactively design policies and practices to secure users and Internet infrastructure has never been greater. Yet, cybersecurity public policy conversations too often areContinue Reading

UK surveillance program collected billions of records from persons in multiple countries

Ryan Gallagher, The Intercept: “…The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ…The surveillance is underpinned byContinue Reading