Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Global law firm implements innovative internal messaging system

Legal Insider – “In an idea that has yet to be fully embraced by its staff, DLA Piper has introduced its own internal Twitter for enterprise called Grapevine. Using Greets instead of Tweets, Grapevine is an open security model which is being used to send messages; spread news, information and know-how across the firm; and send automated messages to update fee-earners on areas such as matter status and bill payments. It is envisaged that Grapevine, which is the brainchild of chief information officer Daniel Pollick and his team, will become a replacement for the ‘no action required by you’ element of email, allowing staff to consume news when they choose.”

Leaked drone company emails reveal plans to deliver spyware using drones

Cora Currier – The Intercept: “There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiary Insitu would like to be able to deliver spyware via drone. The plan is described in internal emails from the Italian company Hacking Team, which makes off-the-shelf software that can remotely infectContinue Reading

Symantec Intelligence Report June 2015

“There is good news this month on the email-based front of the threat landscape. According to our metrics, the overall spam rate has dropped to 49.7 percent. This is the first time this rate has fallen below 50 percent of email for over a decade. The last time Symantec recorded a similar spam rate wasContinue Reading

New EFF Tool Makes Emailing Congress Just a Few Clicks Away

“The Electronic Frontier Foundation (EFF) has created a new tool that makes emailing your congressional lawmakers a quick and easy process. Democracy.io simplifies and streamlines the current fractured system for contacting lawmakers, allowing you to message your two senators and your representative from a single website. “Democracy thrives when the voices of Internet users areContinue Reading

NSA collected and stored social media, email, chats of non targeted Americans

Via The Atlantic – “The Washington Post’s latest article drawing on Snowden’s leaked cache of documents includes files “described as useless by the analysts but nonetheless retained” that “tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000Continue Reading

Information about OPM Cybersecurity Incidents

“OPM –  This site will be updated regularly. What happened How you may be affected What you can do What we are doing to help Frequently Asked Questions What Happened? OPM recently discovered two separate but related cyber-security incidents that have impacted the data of Federal government employees, contractors, and others: In April 2015, OPMContinue Reading

Commentary – Why Protecting Data Privacy Matters, and When

Data Science Central – (A Wake-Up Call to Data Geeks Who Doubt) by Anne Russell “It’s official. Public concerns over the privacy of data used in digital approaches have reached an apex. Worried about the safety of digital networks, consumers want to gain control over what they increasingly sense as a loss of power overContinue Reading

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance

Swire, Peter. The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance. Working Paper GTJMCE 2015-1. Sam Nunn School of International Affairs  – Georgia Institute of Technology. “In June 2015, the Congress adopted and President Obama signed the USA Freedom Act, the biggest pro-privacy change to U.S. intelligence law in nearly 40Continue Reading

Harvard Hacked

“On June 19, Harvard discovered an intrusion on the Faculty of Arts and Sciences and Central Administration information technology networks. Since discovering this intrusion, Harvard has been working with external information security experts and federal law enforcement to investigate the incident, protect the information stored on our systems, and strengthen IT environments across the University.Continue Reading

NSA global surveillance network knows all?

Two Part Series from The Intercept [Part 1 – XKEYSCORE: NSA’s Google for the World’s Private Communications] and Part 2 – Behind the Curtain A Look at the Inner Workings of NSA’s XKEYSCORE “The sheer quantity of communications that XKEYSCORE [global Internet surveillance network run by NSA] processes, filters and queries is stunning. Around theContinue Reading

Report – Who Has Your Digital Back?

Who Has Your Back? 2015: Protecting Your Data From Government Requests. July 2, 2015 | By Parker Higgins: “We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, andContinue Reading

Secret court authorizes continued telephone metadata collection

The Guardian UK: “After a decade in the shadows, a secretive surveillance court that authorises the bulk collection of American telephone records seized on its last chance to show off a little personality on Tuesday [June 30, 2015]. “Plus ça change, plus c’est la même chose, well, at least for 180 days,” wrote judge MichaelContinue Reading