Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Cyberattacks at major law firms highlight security gaps

WSJ.com, Sara Randazzo: “Major U.S. law firms have become more vigilant in recent years about the risks of cyberattacks, but revelations this week of a major hack on two New York firms are a reminder that the industry remains vulnerable. The Manhattan U.S. attorney’s office unsealed a criminal indictment Tuesday against three Chinese men accused… Continue Reading

Intel agencies sued for records on Russian election interference

Follow-up to previous posting – Unreleased CIA assessment concludes Russia aided Trump – via The Hill – Lydia Wheeler, December 27, 2016: “A lawsuit has been filed against the CIA, the FBI, the Department of Homeland Security and the Office of the Director of National Intelligence seeking records pertaining to Russia’s interference in the presidential… Continue Reading

NIST – Guide for Cybersecurity Event Recovery

NIST Special Publication 800-184 Guide for Cybersecurity Event Recovery, 2016. Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew Smith, Greg Witte. Karen Scarfone. https://doi.org/10.6028/NIST.SP.800-184 “bstract – In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps… Continue Reading

Ambrogi – The 10 Most Important Legal Technology Developments of 2016

Via LawSites: “What were 2016’s most important developments in legal technology? Every year since 2013, I’ve posted my picks of the year’s top developments in legal tech (2015, 2014, 2013). As another year wraps up, it’s time to look back at 2016. What follows are my picks for the year’s most important legal technology developments.… Continue Reading

Tech Giants Partner in Effort to Fight Online Terror Content

News release: “Facebook, Microsoft, Twitter and YouTube are coming together to help curb the spread of terrorist content online. There is no place for content that promotes terrorism on our hosted consumer services. When alerted, we take swift action against this kind of content in accordance with our respective policies. Starting today, we commit to… Continue Reading

Statement on Requests for Additional Information on Russian Interference in the 2016 Presidential Election

DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 December 16, 2016 “Statement on Requests for Additional Information on Russian Interference in the 2016 Presidential Election – Recently, the Office of the Director of National Intelligence has received requests from Members of Congress, several Electors of the Electoral College and the general public for additional information on… Continue Reading

Risk and Anxiety: A Theory of Data Breach Harms

Solove, Daniel J. and Citron, Danielle Keats, Risk and Anxiety: A Theory of Data Breach Harms (December 14, 2016). Available for download at SSRN: https://ssrn.com/abstract=2885638 “In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are… Continue Reading

Data Breach Incidents, Causes, and Response

Data Breach Incidents, Causes, and Response, 12/12/2016“In October and November of 2012 the Society of Corporate Compliance and Ethics and the Health Care Compliance Association conducted a survey among compliance professionals to better understand the impact and frequency of data breaches. At the time breaches were very much in the news, just as they are today. To assess whether and… Continue Reading

NBC reports U.S. Intel Directly Links President Putin to Campaign to Disrupt U.S. Election

Follow up to multiple postings included in NYT details how Russian Cyberpower Invaded the U.S., today’s NBC News report – U.S. Officials: Putin Personally Involved in U.S. Election Hack: “U.S. intelligence officials now believe with “a high level of confidence” that Russian President Vladimir Putin became personally involved in the covert Russian campaign to interfere… Continue Reading

NYT details how Russian Cyberpower Invaded the U.S.

Follow up to posting series captioned Unreleased CIA assessment concludes Russia aided Trump – see The Perfect Weapon: How Russian Cyberpower Invaded the U.S. By Eric Lipton, David E. Sanger and Scott Shane – Dec. 13, 2016: “It was the cryptic first sign of a cyberespionage and information-warfare campaign devised to disrupt the 2016 presidential… Continue Reading

BeSpacific joins ABA Top 100 Blawgs 2016

“BeSpacific NEW, Top 100 Blawgs: “No one better has her finger on the pulse of the legal information world than Sabrina Pacifici, law librarian and author of the blog BeSpacific,” writes blogger Robert Ambrogi. “Launched in 2002, BeSpacific is one of the longest-running legal blogs and, remarkably, Sabrina seems more prolific today than ever. She… Continue Reading

EFF – How To Enable Two-Factor Authentication on Gmail and Google

“…You can enable 2FA for your Gmail account on Google’s single settings page, so your new, more secure settings will apply across other Google services like Google Drive and Google+. Google calls it “two-step verification,” but the idea is exactly the same: if signing in requires something you have (like your phone) as well as… Continue Reading