Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Invincea 1H 2015 Advanced Endpoint Threat Report

Nextgov: “Malicious code Russians reportedly used to jimmy open a White House network and malware Chinese hackers reportedly used to rupture insurer Anthem’s network were similar — and free, according to new research…The Anthem hackers compromised the Social Security numbers and other personal information of about 80 million customers. The White House hackers infiltrated anContinue Reading

CRS – National Security Letters in Foreign Intelligence Investigations

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background, Charles Doyle, Senior Specialist in American Public Law. July 31, 2015. “Five federal statutes authorize intelligence officials to request certain business record information in connection with national security investigations. The authority to issue these national security letters (NSLs) is comparable to theContinue Reading

Another Snowden Reveal – Telecom Giant Provides Massive Data Pipeline to NSA

NYT and ProPublica investigative reports: “The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newlyContinue Reading

Global law firm implements innovative internal messaging system

Legal Insider – “In an idea that has yet to be fully embraced by its staff, DLA Piper has introduced its own internal Twitter for enterprise called Grapevine. Using Greets instead of Tweets, Grapevine is an open security model which is being used to send messages; spread news, information and know-how across the firm; and sendContinue Reading

Leaked drone company emails reveal plans to deliver spyware using drones

Cora Currier – The Intercept: “There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiary Insitu would like to be able to deliver spyware via drone. The plan is described in internal emails from the Italian company Hacking Team, which makes off-the-shelf software that can remotely infectContinue Reading

Symantec Intelligence Report June 2015

“There is good news this month on the email-based front of the threat landscape. According to our metrics, the overall spam rate has dropped to 49.7 percent. This is the first time this rate has fallen below 50 percent of email for over a decade. The last time Symantec recorded a similar spam rate wasContinue Reading

New EFF Tool Makes Emailing Congress Just a Few Clicks Away

“The Electronic Frontier Foundation (EFF) has created a new tool that makes emailing your congressional lawmakers a quick and easy process. Democracy.io simplifies and streamlines the current fractured system for contacting lawmakers, allowing you to message your two senators and your representative from a single website. “Democracy thrives when the voices of Internet users areContinue Reading

NSA collected and stored social media, email, chats of non targeted Americans

Via The Atlantic – “The Washington Post’s latest article drawing on Snowden’s leaked cache of documents includes files “described as useless by the analysts but nonetheless retained” that “tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000Continue Reading

Information about OPM Cybersecurity Incidents

“OPM –  This site will be updated regularly. What happened How you may be affected What you can do What we are doing to help Frequently Asked Questions What Happened? OPM recently discovered two separate but related cyber-security incidents that have impacted the data of Federal government employees, contractors, and others: In April 2015, OPMContinue Reading

Commentary – Why Protecting Data Privacy Matters, and When

Data Science Central – (A Wake-Up Call to Data Geeks Who Doubt) by Anne Russell “It’s official. Public concerns over the privacy of data used in digital approaches have reached an apex. Worried about the safety of digital networks, consumers want to gain control over what they increasingly sense as a loss of power overContinue Reading

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance

Swire, Peter. The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance. Working Paper GTJMCE 2015-1. Sam Nunn School of International Affairs  – Georgia Institute of Technology. “In June 2015, the Congress adopted and President Obama signed the USA Freedom Act, the biggest pro-privacy change to U.S. intelligence law in nearly 40Continue Reading

Harvard Hacked

“On June 19, Harvard discovered an intrusion on the Faculty of Arts and Sciences and Central Administration information technology networks. Since discovering this intrusion, Harvard has been working with external information security experts and federal law enforcement to investigate the incident, protect the information stored on our systems, and strengthen IT environments across the University.Continue Reading