Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

President Obama’s new Cybersecurity National Action Plan

“What is the President’s Cybersecurity National Action Plan (CNAP)? It’s the capstone of more than seven years of effort from this administration that takes near-term actions and puts in place a long-term strategy to ensure the federal government, the private sector, and American citizens can take better control of our digital security. The President’s plan… Continue Reading

Reconciling Perspectives: New Report Reframes Encryption Debate

“The Berklett Cybersecurity Project of the Berkman Center for Internet & Society at Harvard University is pleased to announce the publication of a new report entitled “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” The report examines the high-profile debate around government access to encryption, and offers a new perspective gleaned from the discussion,… Continue Reading

Digital Preservation Coalition Report – Personal Digital Archiving

Digital Preservation Coalition Technology Watch Report ‘Personal Digital Archiving’, by Gabriela Redwine, Digital Archivist at the Beinecke Rare Book and Manuscript Library at Yale University. “This free peer-reviewed report is aimed at individuals who are concerned about how best to manage and preserve their own personal digital archives, as well as professionals who advise people… Continue Reading

Oversight Committee Announces FITARA Scorecard

“Members of the House Oversight and Government Reform Committee released a scorecard assigning letter grades to federal agencies on their implementation of the bipartisan Federal Information Technology Acquisition Reform Act (FITARA), enacted in December 2014. Full Committee Chairman Jason Chaffetz (R-UT), IT Subcommittee Chairman Will Hurd (R-TX) and Ranking Member Robin Kelly (D-IL), and Government… Continue Reading

OMB – Federal Information Security Modernization Act Audit FY 2015

“In FY 2015 OPM was the victim of a massive data breach that involved the theft of sensitive personal information of millions of individuals. For many years we have reported critical weaknesses in OPM’s ability to manage its information technology (IT) environment, and warned that the agency was as an increased risk of a data… Continue Reading

PWC 2015 US CEO Survey

“For the first time in five years in PwC’s Annual Global CEO Survey, more business leaders rate the US as their most important market for overseas growth ahead of all others, including China’s. As the US recovery gains traction, it is gaining more adherents. Challenges remain, yet key measures of US economic health are improving.… Continue Reading

Google – An Empirical Analysis of Email Delivery Security

Neither Snow Nor Rain Nor MITM…An Empirical Analysis of Email Delivery Security “The SMTP protocol is responsible for carrying some of users’ most intimate communication, but like other Internet protocols, authentication and confidentiality were added only as an afterthought. In this work, we present the first report on global adoption rates of SMTP security extensions,… Continue Reading

Pew – Apps Permissions in Google Play Store

“Analysis of over 1 million apps in Google’s Android operating system in 2014 shows apps can seek 235 different kinds of permissions from smartphone users. The average app asks for five permissions.” “The findings in this study pertain specifically to apps running on the Android operating system. Pew Research Center examined the Android platform because… Continue Reading

Password Security – How to Memorize a Random 60-Bit String

How to Memorize a Random 60-Bit String. Marjan Ghazvininejad, Kevin Knight – Information Sciences Institute, Department of Computer Science, University of Southern California: “User-generated passwords tend to be memorable, but not secure. A random, computer-generated 60-bit string is much more secure. However, users cannot memorize random 60- bit strings. In this paper, we investigate methods… Continue Reading

Victims of Identity Theft, 2014

Victims of Identity Theft, 2014 – Erika Harrell, Ph.D., – BJS Statistician “An estimated 17.6 million persons, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014, the Bureau of Justice Statistics (BJS) announced today. These statistics were similar to those in… Continue Reading

Manners 2.0: Key findings about etiquette in the digital age

“Some 92% of Americans now have a cellphone of some kind, and 90% of those cell owners say that their phone is frequently with them. This “always-on” mobile connectivity is changing the nature of public spaces and social gatherings. It is also rewriting social norms regarding what is rude and what is acceptable behavior when people… Continue Reading

UK surveillance program collected billions of records from persons in multiple countries

Ryan Gallagher, The Intercept: “…The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ…The surveillance is underpinned by… Continue Reading