Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

100,000 android smartphones have backdoor hacking your data sending it to China

Secret Backdoor in Some U.S. Phones Sent Data to China, Analysts Say – “For about $50, you can get a smartphone with a high-definition display, fast data service and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72 hours. Security contractors recently discovered preinstalled software in some Android phones that monitors where users go, whom they talk to and what they write in text messages. The American authorities say it is not clear whether this represents secretive data mining for advertising purposes or a Chinese government effort to collect intelligence…”

Mellon Foundation and Digital Preservation Coalition Sponsor Formation of Task Force for Email Archives

“The Andrew W. Mellon Foundation and the Digital Preservation Coalition announced the formation of a Task Force on Technical Approaches for Email Archives. The task force is charged with assessing current frameworks, tools, and approaches being taken toward these critical historical sources. Christopher Prom, assistant university archivist/Andrew S. G. Turyn Endowed Professor at the University of Illinois… Continue Reading

IRS IG – Review of the Enterprise E-Mail System Acquisition

Review of the Enterprise E-Mail System Acquisition, September 30, 2016. Reference Number: 2016-20-080. “The IRS purchased subscriptions for an enterprise e-mail system [Microsoft] that, as it turned out, it could not use. The purchase was made without first determining project infrastructure needs, integration requirements, business requirements, security and portal bandwidth, and whether the subscriptions were… Continue Reading

Fortune – Publishing Hacked Private Emails Can Be a Slippery Slope

“It may be hard for the media to resist a big email dump, but there are long-term risks. Regular dumps of classified documents and other internal communications have become a fixture of modern life, thanks in part to stateless—and frequently lawless—entities like WikiLeaks. But is publishing those leaks always the right thing to do? That’s… Continue Reading

NIST study – Security Fatigue

Security Fatigue, Issue No. 05 – Sept.-Oct. (2016 vol. 18) ISSN: 1520-9202 pp: 26-32 DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2016.84 “Security fatigue has been used to describe experiences with online security. This study identifies the affective manifestations resulting from decision fatigue and the role it plays in users’ security decisions. A semistructured interview protocol was used to collect… Continue Reading

Report – Yahoo scanned hundreds of millions of emails for gov surveillance

UK Guardian: “Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security… Continue Reading

District Court Judge releases list of more than 200 cases veiled in secrecy of Patriot Act

Washington Post – This judge just released 200 secret government surveillance requests “U.S. District Chief Judge Beryl A. Howell, a former Senate aide who helped draft the Patriot Act, has defied easy labeling throughout a decades-long career spent charting the frontier of technology and law in the nation’s capital….In ordering the first-ever release by a… Continue Reading

Vanity Fair – Welcome to the Dark Net

Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free “…Definitions. A vulnerability is a weakness in a network’s defenses. An exploit is a piece of software that takes advantage of a vulnerability. A zero-day exploit is a piece of software that takes advantage of a vulnerability that… Continue Reading

Newsweek – Between 2003 and 2009, the Bush White House “lost” 22 million emails

Gone but not forgotten, email messages lost, not archived, disappeared – at the highest level of government – written by officials from both parties, and lest we forget, this reminder by Nina Burleigh in Newsweek – “For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email… Continue Reading

FBI FOIA Release – Hillary R. Clinton documents

“Hillary Rodham Clinton served as U.S. Secretary of State from January 21, 2009 to February 1, 2013. The FBI conducted an investigation into allegations that classified information was improperly stored or transmitted on a personal e-mail server she used during her tenure.” Via WSJ.com: “On Friday afternoon September 2, 2016], the Federal Bureau of Investigation… Continue Reading

Unprecedented mass hack of Democratic members of Congress

PCWorld: “The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for hacking confidential files from a related campaign group. Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and… Continue Reading

NIST Updates Personal Identity Verification Guid

“NIST has recently expanded the flexibility and enhanced the security of Personal Identity Verification (PIV) credentials by updating the following guidelines: • Special Publication (SP) 800-156, Representation of PIV Chain-of-Trust for Import and Export, provides details regarding the use of chain -of -trust for import and export among PIV Card issuers. • SP 800-166, Derived… Continue Reading