Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

CRS – Cyberwarfare and Cyberterrorism

Cyberwarfare and Cyberterrorism: In Brief, Catherine A. Theohary, Specialist in National Security, Policy and Information Operations. John W. Rollins, Specialist in Terrorism and National Security. March 27, 2015. “Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized asContinue Reading

White House Announces A New Tool Against Cyber Threats

“It’s one of the great paradoxes of our Information Age — the very technologies that empower us to do great good can also be used by adversaries to inflict great harm. The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that supportContinue Reading

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Cybersecurity and Information Sharing: Legal Challenges and Solutions, Andrew Nolan, Legislative Attorney. March 16, 2015. “Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: theContinue Reading

Even more unwanted software protection via the Safe Browsing API

Google Online Security Blog: ” Deceptive software disguised as a useful download harms your web experience by making undesired changes to your computer. Safe Browsing offers protection from such unwanted software by showing a warning in Chrome before you download these programs. In February we started showing additional warnings in Chrome before you visit aContinue Reading

Detekt – free tool that scans your Windows computer for traces of commercial surveillance spyware

Via FastCoExit: “Spyware like FinFisher contributes to a multi-billion dollar business. But until last week, activists had few ways to defend themselves, aside from the well-placed bit of duct tape over the computer camera and rigorous digital hygiene practices. That’s why Amnesty International, Privacy International, Digitale Gesellschaft, and the Electronic Frontier Foundation rolled out aContinue Reading

The Importance of Addressing Cybersecurity Risks in the Financial Sector

Sarah J. Dahlgren, executive vice president and member of the Bank’s Management Committee, head of the Financial Institution Supervision Group at the Federal Reserve Bank of New York – Remarks at the OpRisk North America Annual Conference, New York City: I am often asked about my list of “things that keep me awake at night,”Continue Reading

5 ways to keep your data safe right now

Christopher Soghoian is a TED Fellow, and the principal technologist at the American Civil Liberties Union, where he monitors the intersection of federal surveillance and citizen’s rights. Before joining the ACLU, he was the first-ever technologist for the Federal Trade Commission’s Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter,Continue Reading

Cybersecurity and Information Sharing: Legal Challenges and Solutions

CRS – Cybersecurity and Information Sharing: Legal Challenges and Solutions. Andrew Nolan, Legislative Attorney. March 16, 2015. “Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broaderContinue Reading

The HTTPS-Only Standard proposed by OMB

“The American people expect government websites to be secure and their interactions with those websites to be private. Hypertext Transfer Protocol Secure (HTTPS) offers the strongest privacy protection available for public web connections with today’s internet technology. The use of HTTPS reduces the risk of interception or modification of user interactions with government online services.Continue Reading

Insecurity in the Internet of Things

Symantec – Insecurity in the Internet of Things – Mario Ballano Barcena, Candid Wueest, March 12, 2015. “The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree thatContinue Reading

StingRay surveillance device intercepts a cellphone signals, capture texts, calls, emails and other data

NYT – A Police Gadget Tracks Phones? Shhh! It’s Secret – “A powerful new surveillance tool being adopted by police departments across the country comes with an unusual requirement: To buy it, law enforcement officials must sign a nondisclosure agreement preventing them from saying almost anything about the technology… The technology goes by various names,Continue Reading

Cisco 2015 Annual Security Report

New Threat Intelligence and Trend Analysis – “Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. Attackers are realizing that bigger and bolder is not always better. The Cisco 2015 Annual Security Report reveals shifts in attack techniques, emerging vulnerabilities, and the state of enterprise security preparedness.Continue Reading