Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance

Swire, Peter. The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance. Working Paper GTJMCE 2015-1. Sam Nunn School of International Affairs  – Georgia Institute of Technology. “In June 2015, the Congress adopted and President Obama signed the USA Freedom Act, the biggest pro-privacy change to U.S. intelligence law in nearly 40Continue Reading

Harvard Hacked

“On June 19, Harvard discovered an intrusion on the Faculty of Arts and Sciences and Central Administration information technology networks. Since discovering this intrusion, Harvard has been working with external information security experts and federal law enforcement to investigate the incident, protect the information stored on our systems, and strengthen IT environments across the University.Continue Reading

NSA global surveillance network knows all?

Two Part Series from The Intercept [Part 1 – XKEYSCORE: NSA’s Google for the World’s Private Communications] and Part 2 – Behind the Curtain A Look at the Inner Workings of NSA’s XKEYSCORE “The sheer quantity of communications that XKEYSCORE [global Internet surveillance network run by NSA] processes, filters and queries is stunning. Around theContinue Reading

Report – Who Has Your Digital Back?

Who Has Your Back? 2015: Protecting Your Data From Government Requests. July 2, 2015 | By Parker Higgins: “We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, andContinue Reading

Secret court authorizes continued telephone metadata collection

The Guardian UK: “After a decade in the shadows, a secretive surveillance court that authorises the bulk collection of American telephone records seized on its last chance to show off a little personality on Tuesday [June 30, 2015]. “Plus ça change, plus c’est la même chose, well, at least for 180 days,” wrote judge MichaelContinue Reading

OPM – Actions to Strengthen Cybersecurity and Protect Critical IT Systems

“The recent intrusions into U.S. Office of Personnel Management (OPM) systems that house personnel and background investigation data for Federal employees and other individuals have raised questions about the security of OPM data and the integrity of its Information Technology (IT) assets. Since Director Archuleta arrived at OPM, she has led the agency in takingContinue Reading

GAO Report – Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies

Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies, GAO-15-725T: Published: Jun 24, 2015. Publicly Released: Jun 24, 2015 “GAO has identified a number of challenges federal agencies face in addressing threats to their cybersecurity, including the following: Designing and implementing a risk-based cybersecurity program. Enhancing oversight of contractors providing IT services.Continue Reading

Job Opening – New Librarian of Congress

The Atlantic – Robinson Meyer: Experts say that a new librarian should digitize more works, raise more money—and use email. “The current librarian, James Billington, has held the title since his appointment by President Reagan in 1987. Though named by the president and confirmed by the Senate, the Librarian doesn’t change with every new WhiteContinue Reading

Massive Government Data Breach Even Worse than Reported

EPIC:  “A Congressional hearing on the Office of Personnel Management data breach has now revealed one of the worst data breaches in US history. The agency initially reported that the personal information of 4 million government employees was obtained, but news reports suggest the breach was much larger–exposing the social security numbers of more thanContinue Reading

UK: Information Security Breaches Survey 2015

PWC: “We have been commissioned by the Department for Business, Innovation and Skills (BIS) to survey companies across the UK on cyber security incidents and emerging trends…The key observations from the 2015 survey were: The number of security breaches has increased, the scale and cost has nearly doubled. Eleven percent of respondents changed the natureContinue Reading

Report – hacker had access to U.S. security clearance data for one year

Follow up to previous posting, Massive hack of federal personnel files included security-clearance database, again via Washington Post: “The recently disclosed breach of the Office of Personnel Management’s security-clearance computer system took place a year ago, giving Chinese government intruders access to sensitive data for a year, according to new information. The considerable lag time between breachContinue Reading

DOJ Prevailed Over Google on Email Privacy Case

Ryan Gallagher – The Intercept: “The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks. Newly unsealed court documents obtained by The Intercept reveal the Justice Department won an order forcing Google to turn over more than one year’s worth of data from the GmailContinue Reading