Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

White House – Cybersecurity Strategy and Implementation Plan

Tony Scott – Federal CIO – Modernizing Federal Sybersecurity – [October 30, 2015] “the Administration directed a series of actions to continue strengthening Federal cybersecurity & modernizing the government’s technology infrastructure. Strengthening the cybersecurity of Federal networks, systems, and data is one of the most important challenges we face as a Nation. Every day, publicContinue Reading

McKinsey Quarterly 2015 Number 3

“Introduces McKinsey’s metric for a company’s digital maturity: the Digital Quotient. Also examines a new approach to business-model innovation, simple rules for breakthrough ideas, and a guide to machine learning.” Issue contents: Digital Quotient •    Raising your Digital Quotient •    An executive’s guide to machine learning •    Repelling the cyberattackers •    Getting a sharper pictureContinue Reading

Paper – A Riddle Wrapped in an Enigma

A Riddle Wrapped in an Enigma by Neal Koblitz and Alfred J. Menezes – “In August 2015 the U.S. National Security Agency (NSA) released a major policy statement on the need for post-quantum cryptography (PQC). This announcement will be a great stimulus to the development, standardization, and commercialization of new quantum-safe algorithms. However, certain peculiaritiesContinue Reading

Password Security – How to Memorize a Random 60-Bit String

How to Memorize a Random 60-Bit String. Marjan Ghazvininejad, Kevin Knight – Information Sciences Institute, Department of Computer Science, University of Southern California: “User-generated passwords tend to be memorable, but not secure. A random, computer-generated 60-bit string is much more secure. However, users cannot memorize random 60- bit strings. In this paper, we investigate methodsContinue Reading

GAO Reports – Critical Infrastructure Protection, Drug Control, Indian Energy, Post 9/11 GI Bill, Unaccompanied Alien Children

Critical Infrastructure Protection: Cybersecurity of the Nation’s Electricity Grid Requires Continued Attention, GAO-16-174T: Published: Oct 21, 2015. Publicly Released: Oct 21, 2015. Drug Control: Additional Performance Information Is Needed to Oversee the National Guard’s State Counterdrug Program, GAO-16-133: Published: Oct 21, 2015. Publicly Released: Oct 21, 2015. Indian Energy Development: Actions Needed to Address BIAContinue Reading

Facebook – Notifications for targeted attacks

October 16, 2015 – Alex Stamos is the Chief Security Officer at Facebook. “The security of people’s accounts is paramount at Facebook, which is why we constantly monitor for potentially malicious activity and offer many options to proactively secure your account. Starting today, we will notify you if we believe your account has been targetedContinue Reading

EU Report – The challenge of resilience in a globalised world

The challenge of resilience in a globalised world. Joint Research Centre. EUR 27280 EN. Report by the Joint Research Centre the European Commission’s in-house science service. “…[this] Directorate-General Joint Research Centre Resilience Report is the first-ever attempt to deepen our knowledge and develop a holistic approach by analysing various strategies for building resilience in theContinue Reading

The Hidden Data Economy

The Marketplace for Stolen Digital Information – McAfee – This report was researched and written by: Charles McFarland, François Paget, Raj Saman. Raj Samani, CTO of Intel Security for Europe, the Middle East, and Africa: “Data is the “oil” of the digital economy. The commercial market for personal data is booming, with large databases ofContinue Reading

Final Report of Defense Science Board 2012 Summer Study on Strategic Surprise

Via FAS: Office of the Secretary of Defense, February 26, 2015 – Memorandum for Chairman, Defense Science Board / Subject: Final Report of the Defense Science Board 2012 Summer Study on Strategic Surprise “The final report of the Defense Science Board 2014 Summer Study on Strategic Surprise is attached. In accordance with its charter, theContinue Reading

The Rise and Impact of Digital Amnesia

Kaspersky Lab – Why we need to protect what we no longer remember – “Key findings from the study include: • Across the United States, the study shows that an overwhelming number of consumers can easily admit their dependency on the Internet and devices as a tool for remembering. Almost all (91.2%) of those surveyed agreed that they use the Internet as anContinue Reading

GAO Reports – Diplomatic Security, Maritime Cybersecurity, Space Situational Awareness, USAID

Diplomatic Security: Options for Locating a Consolidated Training Facility, GAO-16-139T: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015. Maritime Critical Infrastructure Protection: DHS Needs to Enhance Efforts to Address Port Cybersecurity, GAO-16-116T: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015. Space Situational Awareness: Status of Efforts and Planned Budgets, GAO-16-6R: Published: Oct 8, 2015. Publicly Released: Oct 8, 2015.Continue Reading

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist, September 8, 2015. “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic orContinue Reading