Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Markey Report Reveals Automobile Security and Privacy Vulnerabilities

“New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen majorContinue Reading

Government agencies enable HTTP Strict Transport Security for public websites

Ashkan Soltani, Chief Technologist, FTC: “I’m pleased to announce that the FTC has joined a number of other federal agencies in deploying additional security best practices for our public consumer websites: donotcall.gov, ftccomplaintassistant.gov, and hsr.gov.: ” The websites, which already employ HTTPS encryption, have enabled a feature known as HTTP Strict Transport Security (HSTS) whichContinue Reading

Anthem breach Shows Risks of “Big Data”

EPIC – “One of the largest health insurers in the country has lost millions of medical records of American consumers. The most recent breach of sensitive medical information shows the dangers of “Big Data” and the mistaken conclusion of the report of the Presidents Science Advisors, which simply assumed the benefits of data collection. EPICContinue Reading

Understanding the Federal Government’s IT Insecurity Crisis

A February 5, 2015 Report From the International Association of Information Technology Asset Managers – “U.S. taxpayers have paid $59 billion for data protection since Fiscal Year 2010, including $10.3 billion in the most recent year under the Federal Information Security Management Act (FISMA). This week, the Obama Administration proposed a $14 billion cybersecurity budgetContinue Reading

Bitcoin: Questions, Answers, and Analysis of Legal Issues

CRS – Bitcoin: Questions, Answers, and Analysis of Legal Issues. Craig K. Elwell, Specialist in Macroeconomic Policy; Maureen Murphy, Legislative Attorney; Michael V. Seitzinger, Legislative Attorney, January 28, 2015 “Bitcoin first appeared in January 2009, the creation of a computer programmer using the pseudonym Satoshi Nakamoto. His invention is an open-source (its controlling computer codeContinue Reading

Allianz Risk Barometer 2015: Businesses exposed to increasing number of disruptive scenarios

“Businesses face new challenges from a rise of disruptive scenarios in an increasingly interconnected corporate environment, according to the fourth Allianz Risk Barometer 2015. In addition, traditional industrial risks such as business interruption and supply chain risk (46% of responses), natural catastrophes (30%), and fire and explosion (27%) continue to concern risk experts, heading thisContinue Reading

Hearing Before the Senate On Protecting America from Cyber Attacks: The Importance of Information Sharing

CDT – “Greg Nojeim’s testimony for the January 28th hearing before the Senate Homeland Security and Government Affairs Committee on Protecting America from Cyber Attacks. He will explain how Congress can embrace cybersecurity information sharing policies with appropriate authorities and safeguards that enhance both privacy and security, first describing the cybersecurity threat then identifying different approachesContinue Reading

Readiness, Recovery, Response: Social Media Cyber-Vandalism Toolkit

“Cyber-vandalism presents a serious challenge to online-based communication tools. Users need available resources to counter intrusions of social media accounts. This document provides guidance and security practices to federal, state, and local government employees. Suggestions and resources prepare users to respond to cyber-hijacking. and will empower digital users to make informed choices and enact futureContinue Reading

FY2014 DOT&E Annual Report has been released to Congress

DOT&E FY2014 Annual Report. Michael Gilmore, Director – Operational Test & Evaluation Office of the Secretary of Defense: “Since my appointment as Director, I have required thorough operational tests that provide adequate information to characterize system performance across a variety of operational conditions. This information is essential to my evaluation of system operational effectiveness, suitability,Continue Reading

DoD Cloud Computing Security Requirements Guide

Department of Defense (DoD)  Cloud Computing Security Requirements Guide (SRG). Version 1, Release 1. 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense (DoD). “Cloud computing technology and services provide the Department of Defense (DoD) with the opportunity to deploy an Enterprise Cloud Environment aligned with Federal Department-wide Information Technology (IT) strategies and efficiency initiatives, including federalContinue Reading

GAO Report – Federal Facility Cybersecurity

Federal Facility Cybersecurity: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems, GAO-15-6: Published: Dec 12, 2014. Publicly Released: Jan 12, 2015: “The Department of Homeland Security (DHS) has taken preliminary steps to begin to understand the cyber risk to building and access controls systems in federal facilities. For example, in 2013,Continue Reading

Tallinn Manual on the International Law Applicable to Cyber Warfare

NATO Cooperative Cyber Defence Centre of Excellence: “The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international legal norms apply to this ‘new’ form of warfare. The Tallinn ManualContinue Reading