Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Report by 3 companies – Cyber resiliency in the Fourth Industrial Revolution

Cyber resiliency in the Fourth Industrial Revolution – A roadmap for global leaders facing emerging cyber threats “The First Industrial Revolution, in the late 18th century, was driven largely by steam engines. The second, in the late 19th century, introduced mass production and the division of labor. The third, in the late 20th century, involved… Continue Reading

McCaul – Warner Commission on Digital Security

“Chairman Michael McCaul and Senator Mark Warner introduced the Digital Security Commission Act on February, 29, 2016. The purpose of this Commission is to collectively address the larger issue of protecting national security and digital security, without letting encrypted communications become a safe haven for terrorists. This Commission brings together the most capable experts and stakeholders from… Continue Reading

LC target of DNS attack and a commentary on LC and digitization challenges, July 18, 2016: “The Library of Congress was the target of a denial-of-service attack that has knocked out and the U.S. Copyright Office website, and caused outages at other sites hosted by the library. Library spokesperson Gayle Osterberg told FCW that the DNS attack was launched July 17 and continues to affect library… Continue Reading

MuckRock launching a national database of FOIA exemptions

Michael Morisy – We’re building an open guide to every state’s public records law – Help track down and fight every public records exemption across the country. “With agencies increasingly using an array of exemptions to deny access to information, we want to help requesters fight back. We’re launching a project to track every public… Continue Reading

House Homeland Security Report – Going Dark, Going Forward: A Primer on the Encryption Debate

June 29, 2016: “Terrorist attacks in Paris and San Bernardino have sparked a public debate on the use of encryption in our society because the attackers used encrypted communications to evade detection, a phenomenon known as “going dark.” Today, the Majority Staff of the House Homeland Security Committee released a new report entitled, Going Dark,… Continue Reading

2015 Wiretap Report: Intercept Orders Rise 17 Percent

United States Courts, June 30, 2016: “The number of federal and state wiretaps terminated in 2015 increased nearly 17 percent over 2014, according to an annual report submitted to Congress by the Administrative Office of the U.S. Courts. As in previous years, drug investigations and telephone wiretaps accounted for the large majority of cases. The… Continue Reading

IG – Audit Finds Inactive Accounts Within the Department of State’s Active Directory

OIG, U.S. Department of State, Management Assistance Report: Inactive Accounts Within the Department of State’s Active Directory, AUD-IT-16-37, Office of Audits. June 2016. “According to the National Institute of Standards and Technology, inactive accounts should be automatically disabled after a defined period of time. The Foreign Affairs Handbook states that Department officials must disable inactive… Continue Reading

UK company proposes extensive data mining on renters for landlords benefit

Washington Post – Creepy startup will help landlords, employers and online dates strip-mine intimate data from your Facebook page “…Tenant Assured, is already live: After your would-be landlord sends you a request through the service, you’re required to grant it full access to your Facebook, LinkedIn, Twitter and/or Instagram profiles. From there, Tenant Assured scrapes… Continue Reading

NYT – A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet

Neil MacFarquar – Moscow – “A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab’s Moscow headquarters, where a small television screen displays cyberthreats occurring in real time around the world — a blinking, spinning, color-coded globe brimming with suspicious emails, malware and evil botnets that could be infecting a… Continue Reading

Sunlight Foundation is using IFTTT to make the government more open

“Want to know when the president signs a bill into law? When congress votes on a bill? When a new legislator is representing you? Since 2014, The Sunlight Foundation has been connecting its massive trove of government data to IFTTT, the popular web service that connects things on the internet to other things…For those unfamiliar… Continue Reading

MailChimp Content Style Guide

MailChimp Content Style Guide – MailChimp 2016. This work is available under a Creative Commons Attribution-NonCommercial 4.0 International License. [Note – I am a MailChimp customer and am pleased this guide is available.] Continue Reading

Study identifies metadata mining of telephone data by NSA

“Privacy protections against government surveillance are often scoped to communications content and exclude communications metadata. In the United States, the National Security Agency operated a particularly controversial program, collecting bulk telephone metadata nationwide. We investigate the privacy properties of telephone metadata to assess the impact of policies that distinguish between content and metadata. We find… Continue Reading