Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Administrative Investigation, Improper Use of Web-based Collaboration Technology, VA Office of Info Tech

Office of Inspector General Office of Veterans Affairs – Report Number: 13-03054-463 – Redacted – 8/17/2015. “VA employees improperly used, a Web-based collaboration technology, which was not approved or monitored as required by VA policy. Further, the website had vulnerable security features, recurring website malfunctions, and users engaged in a misuse of time andContinue Reading

How Victims Can Regain Control Mitigate Threats in Wake of OPM Breach

 “In June 2015, the Nation learned that the personnel records of 21.5 million United States citizens had been exfiltrated by an unknown adversary from the Office of Personnel Management, one of the largest known breaches in the history of the U.S. Government.  The immediate public outcry included congressional hearings attributing the breach to OPM administrators andContinue Reading

Invincea 1H 2015 Advanced Endpoint Threat Report

Nextgov: “Malicious code Russians reportedly used to jimmy open a White House network and malware Chinese hackers reportedly used to rupture insurer Anthem’s network were similar — and free, according to new research…The Anthem hackers compromised the Social Security numbers and other personal information of about 80 million customers. The White House hackers infiltrated anContinue Reading

CRS – National Security Letters in Foreign Intelligence Investigations

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background, Charles Doyle, Senior Specialist in American Public Law. July 31, 2015. “Five federal statutes authorize intelligence officials to request certain business record information in connection with national security investigations. The authority to issue these national security letters (NSLs) is comparable to theContinue Reading

Another Snowden Reveal – Telecom Giant Provides Massive Data Pipeline to NSA

NYT and ProPublica investigative reports: “The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newlyContinue Reading

Global law firm implements innovative internal messaging system

Legal Insider – “In an idea that has yet to be fully embraced by its staff, DLA Piper has introduced its own internal Twitter for enterprise called Grapevine. Using Greets instead of Tweets, Grapevine is an open security model which is being used to send messages; spread news, information and know-how across the firm; and sendContinue Reading

Leaked drone company emails reveal plans to deliver spyware using drones

Cora Currier – The Intercept: “There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiary Insitu would like to be able to deliver spyware via drone. The plan is described in internal emails from the Italian company Hacking Team, which makes off-the-shelf software that can remotely infectContinue Reading

Symantec Intelligence Report June 2015

“There is good news this month on the email-based front of the threat landscape. According to our metrics, the overall spam rate has dropped to 49.7 percent. This is the first time this rate has fallen below 50 percent of email for over a decade. The last time Symantec recorded a similar spam rate wasContinue Reading

New EFF Tool Makes Emailing Congress Just a Few Clicks Away

“The Electronic Frontier Foundation (EFF) has created a new tool that makes emailing your congressional lawmakers a quick and easy process. simplifies and streamlines the current fractured system for contacting lawmakers, allowing you to message your two senators and your representative from a single website. “Democracy thrives when the voices of Internet users areContinue Reading

NSA collected and stored social media, email, chats of non targeted Americans

Via The Atlantic – “The Washington Post’s latest article drawing on Snowden’s leaked cache of documents includes files “described as useless by the analysts but nonetheless retained” that “tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000Continue Reading

Information about OPM Cybersecurity Incidents

“OPM –  This site will be updated regularly. What happened How you may be affected What you can do What we are doing to help Frequently Asked Questions What Happened? OPM recently discovered two separate but related cyber-security incidents that have impacted the data of Federal government employees, contractors, and others: In April 2015, OPMContinue Reading

Commentary – Why Protecting Data Privacy Matters, and When

Data Science Central – (A Wake-Up Call to Data Geeks Who Doubt) by Anne Russell “It’s official. Public concerns over the privacy of data used in digital approaches have reached an apex. Worried about the safety of digital networks, consumers want to gain control over what they increasingly sense as a loss of power overContinue Reading