Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Government

History of the internet – 40 maps and key resources

For all those who do not recollect or may not know how the internet evolved from ARPANET in 1969 to the web of 2015 with its data analytics, e-commerce profiling and of course, global surveillance, I recommend 40 maps that explain the internet by Timothy B. Lee via Vox, posted on June 2, 2014: “TheContinue Reading

NASA releases application for users to view details on Mars

Via NASA – “Mars Trek is an application that allows you to view imagery and perform analysis on data from the planet Mars.”

UK All-Party Parliamentary Group on Global Health Report

“In the next few years the UK could establish itself more firmly as in leader in health and life sciences or it could begin to lose that status for ever. The UK is a global power in health. It has world class universities and research, is a global leader in health policy and international development,Continue Reading

Information about OPM Cybersecurity Incidents

“OPM –  This site will be updated regularly. What happened How you may be affected What you can do What we are doing to help Frequently Asked Questions What Happened? OPM recently discovered two separate but related cyber-security incidents that have impacted the data of Federal government employees, contractors, and others: In April 2015, OPMContinue Reading

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance

Swire, Peter. The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance. Working Paper GTJMCE 2015-1. Sam Nunn School of International Affairs  – Georgia Institute of Technology. “In June 2015, the Congress adopted and President Obama signed the USA Freedom Act, the biggest pro-privacy change to U.S. intelligence law in nearly 40Continue Reading

NSA global surveillance network knows all?

Two Part Series from The Intercept [Part 1 – XKEYSCORE: NSA’s Google for the World’s Private Communications] and Part 2 – Behind the Curtain A Look at the Inner Workings of NSA’s XKEYSCORE “The sheer quantity of communications that XKEYSCORE [global Internet surveillance network run by NSA] processes, filters and queries is stunning. Around theContinue Reading

FTC on Public Wi-Fi Networks

“Whether in a hotel or airport across the world, or in the coffee shop just down the street, chances are you’ve used free Wi-Fi hotspots. While convenient, they’re often unsecure. So how can you reduce your risk? Encryption — having your information scrambled into code — is key to staying secure online. Watch this videoContinue Reading

Unisys Security Insights – Report for US

“Consumers in the U.S. are most concerned about data breaches at retailers and government agencies. U.S. consumers indicated relatively lower levels of concern about data breaches at other organizations such as airlines, healthcare and telecom companies. Interestingly, the perceived threat of data breaches is low for banks and utilities, possibly reflecting traditional high levels ofContinue Reading

Secret court authorizes continued telephone metadata collection

The Guardian UK: “After a decade in the shadows, a secretive surveillance court that authorises the bulk collection of American telephone records seized on its last chance to show off a little personality on Tuesday [June 30, 2015]. “Plus ça change, plus c’est la même chose, well, at least for 180 days,” wrote judge MichaelContinue Reading

FTC- Start with Security: A Guide for Business

“When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information involved. Threats to data may transform over time, but the fundamentalsContinue Reading

OPM – Actions to Strengthen Cybersecurity and Protect Critical IT Systems

“The recent intrusions into U.S. Office of Personnel Management (OPM) systems that house personnel and background investigation data for Federal employees and other individuals have raised questions about the security of OPM data and the integrity of its Information Technology (IT) assets. Since Director Archuleta arrived at OPM, she has led the agency in takingContinue Reading

DoD Critical Technology ID and Protection

Critical Program Information (CPI) Identification and Protection Within Research,Development, Test, and Evaluation (RDT&E), NUMBER 5200.39. May 28, 2015.