Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Fortune – Publishing Hacked Private Emails Can Be a Slippery Slope

It may be hard for the media to resist a big email dump, but there are long-term risks. Regular dumps of classified documents and other internal communications have become a fixture of modern life, thanks in part to stateless—and frequently lawless—entities like WikiLeaks. But is publishing those leaks always the right thing to do? That’s one of the questions raised by the recent leak of private emails from John Podesta, the campaign chairman for Democratic presidential candidate Hillary Clinton. The WikiLeaks dump consists of tens of thousands of emails, sent to a wide variety of people, about a range of topics that includes both the Clinton campaign and virtually every other aspect of Podesta’s personal life….The most interesting thing about the leak is that it appears to have been carried out with the assistance of certain elements within the Russian government, according to a statement from the U.S. intelligence department. In that sense, it seems to be the fulfillment of a request from Republican candidate Donald Trump, who publicly asked for the Russian security apparatus to hack his opponent’s emails…”

NIST study – Security Fatigue

Security Fatigue, Issue No. 05 – Sept.-Oct. (2016 vol. 18) ISSN: 1520-9202 pp: 26-32 DOI Bookmark: “Security fatigue has been used to describe experiences with online security. This study identifies the affective manifestations resulting from decision fatigue and the role it plays in users’ security decisions. A semistructured interview protocol was used to collect… Continue Reading

Report – Yahoo scanned hundreds of millions of emails for gov surveillance

UK Guardian: “Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security… Continue Reading

District Court Judge releases list of more than 200 cases veiled in secrecy of Patriot Act

Washington Post – This judge just released 200 secret government surveillance requests “U.S. District Chief Judge Beryl A. Howell, a former Senate aide who helped draft the Patriot Act, has defied easy labeling throughout a decades-long career spent charting the frontier of technology and law in the nation’s capital….In ordering the first-ever release by a… Continue Reading

Vanity Fair – Welcome to the Dark Net

Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free “…Definitions. A vulnerability is a weakness in a network’s defenses. An exploit is a piece of software that takes advantage of a vulnerability. A zero-day exploit is a piece of software that takes advantage of a vulnerability that… Continue Reading

Newsweek – Between 2003 and 2009, the Bush White House “lost” 22 million emails

Gone but not forgotten, email messages lost, not archived, disappeared – at the highest level of government – written by officials from both parties, and lest we forget, this reminder by Nina Burleigh in Newsweek – “For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email… Continue Reading

FBI FOIA Release – Hillary R. Clinton documents

“Hillary Rodham Clinton served as U.S. Secretary of State from January 21, 2009 to February 1, 2013. The FBI conducted an investigation into allegations that classified information was improperly stored or transmitted on a personal e-mail server she used during her tenure.” Via “On Friday afternoon September 2, 2016], the Federal Bureau of Investigation… Continue Reading

Unprecedented mass hack of Democratic members of Congress

PCWorld: “The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for hacking confidential files from a related campaign group. Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and… Continue Reading

NIST Updates Personal Identity Verification Guid

“NIST has recently expanded the flexibility and enhanced the security of Personal Identity Verification (PIV) credentials by updating the following guidelines: • Special Publication (SP) 800-156, Representation of PIV Chain-of-Trust for Import and Export, provides details regarding the use of chain -of -trust for import and export among PIV Card issuers. • SP 800-166, Derived… Continue Reading

EFF – How to: Avoid Phishing Attacks

EFF Surveillance Self Defense – “When an attacker sends an email or link that looks innocent, but is actually malicious, it’s called phishing. Phishing attacks are a common way that users get infected with malware—programs that hide on your computer and can be used to remotely control it, steal information, or spy on you. In… Continue Reading

HTTPS Windows exploit targets social security numbers, email addresses

Dan Goodin, arstechnica, August 3, 2016: “The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don’t have the ability to monitor a targeted end user’s Internet connection. The exploit is notable because it doesn’t… Continue Reading

New initiative from Privacy International tracks the global surveillance industry

“A new initiative launched today by Privacy International aims to track the growth and scale of the global surveillance industry, a shadowy sector consisting of companies selling a wide range of electronic surveillance technology to government agencies across the world. Made available today is the world’s largest publicly available educational resource of data and documents… Continue Reading