Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Extensive interview of Edward Snowden – Wired

James Bamford, via Wired: “..Snowden will continue to haunt the US, the unpredictable impact of his actions resonating at home and around the world. The documents themselves, however, are out of his control. Snowden no longer has access to them; he says he didn’t bring them with him to Russia. Copies are now in the handsContinue Reading

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret,Continue Reading

Developing the Cyber Experts of the future – GCHQ certifies Master’s Degrees in Cyber Security

News release: “The certification of six Master’s degrees in Cyber Security was announced by Rt.Hon Francis Maude, Minister for the Cabinet Office, when he visited GCHQ today. This marks another significant step in the development of the UK’s knowledge, skills and capability in all fields of Cyber Security as part of the National Cyber Security Programme. The National CyberContinue Reading

HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack

“HP Fortify on Demand is pleased to announce the release of its Internet of Things State of the Union Study, revealing 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities. Why we did the study – Late last year, we were hearing a lot about Internet of Things, and a bit about IoT security,Continue Reading

US-CERT: Backoff Point-of-Sale Malware

Systems Affected – Point-of-Sale Systems – Alert (TA14-212A) “This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and Analysis Center (FS-ISAC), and Trustwave Spiderlabs, a trusted partner under contract with the USSS.  The purpose of this release is to provide relevant andContinue Reading

NY AG Releases Report Showing Rise In Data Breaches, Provides Security Tips To Small Businesses & Consumers

“Attorney General Eric T. Schneiderman today issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. Using information provided to the Attorney General’s Office pursuant to the New York State Information Security Breach & Notification Act, the report, titled “Information Exposed: Historical Examination of Data Security in NewContinue Reading

Stealing Trade Secrets and Economic Espionage: An Overview of 18 U.S.C. 1831 and 1832

CRS – Stealing Trade Secrets and Economic Espionage: An Overview of 18 U.S.C. 1831 and 1832. Charles Doyle, Senior Specialist in American Public Law. July 25, 2014. “Stealing a trade secret is a federal crime when the information relates to a product in interstate or foreign commerce, 18 U.S.C. 1832 (theft of trade secrets), or when the intended beneficiaryContinue Reading

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity

New America Foundation – “It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is timeContinue Reading

Global Cybercrime: The Interplay of Politics and Law

The Centre for International Governance Innovation (CIGI) – Aaron Shull, June 2014 “Examining global cybercrime as solely a legal issue misses an important facet of the problem. Understanding the applicable legal rules, both domestically and internationally, is important. However, major state actors are using concerted efforts to engage in nefarious cyber activities with the intention ofContinue Reading

Report – Elite Russian hackers breached Nasdq and inserted a digital bomb

BloombergBusinessWeek – Mike Riley: “In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq. It looked like malware had snuck into the company’s central servers. There were indications that the intruder was not a kid somewhere, but the intelligence agency of another country.Continue Reading

NIST Cryptographic Standards and Guidelines Development Process

Report and Recommendations of the Visiting Committee on Advanced Technology of the National Institute of Standards and Technology, July 2014 “This report from Visiting Committee on Advanced Technology (VCAT) of the National Institute of Standards and Technology (NIST) to the NIST Director contains the VCAT’s recommendations on how NIST can improve the cryptographic standards and guidelinesContinue Reading

No silver bullet: De-identification still doesn’t work

Arvind Narayanan and Edward W. Felten. July 9, 2014 “Paul Ohm’s 2009 article Broken Promises of Privacy spurred a debate in legal and policy circles on the appropriate response to computer science research on re-identification techniques. In this debate, the empirical research has often been misunderstood or misrepresented. A new report by Ann Cavoukian and Daniel Castro is full of such inaccuracies,Continue Reading