Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Report by 3 companies – Cyber resiliency in the Fourth Industrial Revolution

Cyber resiliency in the Fourth Industrial Revolution – A roadmap for global leaders facing emerging cyber threats “The First Industrial Revolution, in the late 18th century, was driven largely by steam engines. The second, in the late 19th century, introduced mass production and the division of labor. The third, in the late 20th century, involved… Continue Reading

Global Commission on Internet Governance Final Report

“The Global Commission on Internet Governance was established in January 2014 to articulate and advance a strategic vision for the future of Internet governance. The project conducts and supports independent research on Internet-related dimensions of global public policy.” “Half of the world’s population now uses the Internet to connect, communicate and interact. But basic access… Continue Reading

2016 How Google Fights Piracy Report

Via Google Public Policy Blog: “The internet continues to be a boon for creators, their communities, and the content industry. At Google, we are committed to helping these industries flourish online. Today, Google’s services provide content for people all around the world and generate significant revenue for rightsholders. YouTube alone has now generated over $2… Continue Reading

ACI – Globally, Nearly 1 in 3 Consumers Victimized by Card Fraud

“Thirty percent of consumers globally have experienced card fraud in the past five years, according to new global benchmark data from ACI Worldwide and Aite Group. The global fraud study of more than 6,000 consumers across 20 countries revealed that, compared to ACI’s 2014 benchmark study, card fraud rates—unauthorized activity on three types of payment… Continue Reading

Guidance on cyber resilience for financial market infrastructures

“The Committee on Payments and Market Infrastructures (CPMI) and the International Organization of Securities Commissions (IOSCO) have published the Guidance on cyber resilience for financial market infrastructures (“Cyber Guidance”). This builds on an earlier version of the report that underwent a three-month public consultation. The safe and efficient operation of financial market infrastructures (FMIs) is… Continue Reading

Leakedsource collects hacked data from across the globe

Follow up to previous posting on this database – Leakedsource – “There are currently 1,933,304,758 accounts in our database” – users may search by term or type. Via ET Tech – “If you have an account online regardless of the country you reside in, chances are you have been hacked or will be hacked at… Continue Reading

GAO Reports – 2020 Census, Defense Headquarters, Registering Voters, FOIA, ID Fraud

2020 Census: Census Bureau Needs to Improve Its Life-Cycle Cost Estimating Process, GAO-16-628: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution, GAO-16-652R: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Improved Data Needed to Better Identify Streamlining… Continue Reading

KSN Report: Ransomware in 2014-2016 The evolution of the threat and its future

Kaspersky Lab, June 22, 2016: “Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely… Continue Reading

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to… Continue Reading

GAO – IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program

Identity Theft and Tax Fraud: IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program, GAO-16-508: Published: May 24, 2016. Publicly Released: Jun 23, 2016. “Taxpayer Protection Program (TPP). While the Internal Revenue Service (IRS) has made efforts to strengthen TPP—a program to authenticate the identities of suspicious tax return filers and prevent… Continue Reading

Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems

Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems, GAO-16-501: Published: May 18, 2016. Publicly Released: Jun 21, 2016. “In GAO’s survey of 24 federal agencies, the 18 agencies having high-impact systems identified cyber attacks from “nations” as the most serious and most frequently-occurring threat to the security of their systems. These agencies… Continue Reading

FBI – Business E-mail Compromise: The 3.1 Billion Dollar Scam

“This Public Service Announcement (PSA) is an update to the Business E-mail Compromise (BEC) information provided in Public Service Announcements (PSA) 1-012215-PSA and 1-082715a-PSA. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data. DEFINITION – BEC is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or… Continue Reading