Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret, whilst there is no proof obtained that the bearer of the unit is identical to the owner of the unit. This is the simplest case of a multi-factor authentication, which might involve only one of the three types of authentication factors (a knowledge factor, a possession factor, and an inherence factor) for both steps.”

CIA IG Report Confirms Searches of Senate Computers

Feinstein Statement on CIA IG Report, Washington -  Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) released the following statement: “I was briefed Tuesday by CIA Inspector General David Buckley on the results of an IG investigation [summary only available at this time]. The investigation confirmed what I said on the Senate floor in March – CIA personnel inappropriatelyContinue Reading

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity

New America Foundation – “It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is timeContinue Reading

Deeper Dive into EFF’s Motion on Backbone Surveillance

News release: “Yesterday we filed a motion for partial summary judgment in our long running Jewel v. NSA case, focusing on the government’s admitted seizure and search of communications from the Internet backbone, also called “upstream.” We’ve asked the judge to rule that there are two ways in which this is unconstitutional under the Fourth Amendment: The admitted seizure of communications from theContinue Reading

UK Independent – NSA reportedly tracking any internet users who research privacy software online

James Vincent - “Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD. According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IPContinue Reading

The complicated challenges of archiving and retrieving government email

FCW.com: “When President Barack Obama signed a memorandum on the management of government records in November 2011, some touted it as the first significant action on the topic since Harry Truman signed the Federal Property and Administrative Services Act in 1949 and the Federal Records Act in 1950. More than six decades and 7 billion network devices later,Continue Reading

Former State Dept Exec Calls Executive Order 12333 a “Legal Loophole” for Spying on Americans

EFF – “What kind of data is the NSA collecting on millions, or hundreds of millions, of Americans?” That’s the question John Napier Tye, a former StateDepartment section chief for Internet freedom, calls on the government to answer in his powerful op-ed published today by the Washington Post. In it, Tye calls the NSA’s surveillance operations abroad, conducted under ExecutiveContinue Reading

Global Survey: Widespread Opposition to US Communications Surveillance, Drones

“A new survey from Pew Research finds overwhelming opposition to the US monitoring of emails and phone calls. There appears to be little variation by region or culture, with high levels of opposition found in countries in Europe, South America, Asia, and the Middle East. According to the survey “Global Opinions of U.S. Surveillance,” the four countriesContinue Reading

Guide to Google’s Account History Feature

Martin Brinkmann - ghacks.net: “Most online companies make available privacy related settings that their customers can modify to their liking. The default settings are often less than optimal and making sure that everything is set up properly is one of the first things that you should do. In fact, it is also important to check those settings regularlyContinue Reading

67 Percent of Critical Infrastructure Providers Were Breached Last Year

Jeff Goldman - eSecurity PlanetJeff Goldman - “A recent survey of 599 security executives at utility, oil and gas, energy and manufacturing companies in 13 countries has found that 67 percent have experienced at least one security breach in the past 12 months that led to the loss of confidential information or the disruption of operations. The survey, conductedContinue Reading

Verizon’s Transparency Report for the First Half of 2014

“In the first half of 2014, Verizon received approximately 150,000 requests for customer information from federal, state or local law enforcement in the United States. We do not release customer information unless authorized by law, such as a valid law enforcement demand or an appropriate request in an emergency involving the danger of death or seriousContinue Reading

The State of Data Centric Security

News release: ‘Informatica Corporation, the world’s number one independent provider of data integration software, today announced the availability  of a new research report by the Ponemon Institute LLC, entitled, The State of Data Centric Security. Based on a global survey of more than 1,500 IT and IT security professionals, the study reveals how organizations understand and respond toContinue Reading