Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Records

Highlights of a Forum: Data and Analytics Innovation: Emerging Opportunities and Challenges

Highlights of a Forum: Data and Analytics Innovation: Emerging Opportunities and Challenges, GAO-16-659SP: Published: Sep 20, 2016. Publicly Released: Sep 20, 2016.

“Forum discussions considered the implications of new data-related technologies and developments that are revolutionizing the basic three-step innovation process in the figure below. As massive amounts of varied data become available in many fields, data generation (step 1 in the process) is transformed. Continuing technological advances are bringing more powerful analytics and changing analysis possibilities (step 2 in the process). And approaches to new decision making include intelligent machines that may, for example, guide human decision makers. Additionally, data may be automatically generated on actions taken in response to data analytic results, creating an evaluative feedback loop.”

Vanity Fair – Welcome to the Dark Net

Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free “…Definitions. A vulnerability is a weakness in a network’s defenses. An exploit is a piece of software that takes advantage of a vulnerability. A zero-day exploit is a piece of software that takes advantage of a vulnerability that… Continue Reading

Follow-up Audit – DOJ Implementation of and Compliance with Certain Classification Requirements

Via FAS – Office of the Inspector General U.S. Department of Justice, September 2016 – Follow-up Audit of the Department of Justice’s Implementation of and Compliance with Certain Classification Requirements “The OIG found that DOJ, through the Justice Management Division’s (JMD) Security and Emergency Planning Staff (SEPS), had established classification policies and procedures, but had… Continue Reading

Newsweek – Between 2003 and 2009, the Bush White House “lost” 22 million emails

Gone but not forgotten, email messages lost, not archived, disappeared – at the highest level of government – written by officials from both parties, and lest we forget, this reminder by Nina Burleigh in Newsweek – “For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email… Continue Reading

Updated Circular A-130, Managing Information as a Strategic Resource

White House – OMB: [July 26, 2016] “the Office of Management and Budget (OMB) …releas[ed] an update to the Federal Government’s governing document for the management of Federal information resources: Circular A-130, Managing Information as a Strategic Resource. The way we manage information technology (IT), security, data governance, and privacy has rapidly evolved since A-130… Continue Reading

Unprecedented mass hack of Democratic members of Congress

PCWorld: “The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for hacking confidential files from a related campaign group. Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and… Continue Reading

McKinsey – Policy in the data age

Policy in the data age: Data enablement for the common good By Karim Tadjeddine and Martin Lundqvist “The tremendous impact that digital services have had on governments and society has been the subject of extensive research that has documented the rapid, extensive adoption of public-sector digital services around the globe. We believe that the coming… Continue Reading

NIST Updates Personal Identity Verification Guid

“NIST has recently expanded the flexibility and enhanced the security of Personal Identity Verification (PIV) credentials by updating the following guidelines: • Special Publication (SP) 800-156, Representation of PIV Chain-of-Trust for Import and Export, provides details regarding the use of chain -of -trust for import and export among PIV Card issuers. • SP 800-166, Derived… Continue Reading

New or Expanded Content and Features in FRASER

Via Katrina Stierholz -Federal Reserve Bank of St. Louis: *   “Bulletins of the United States Bureau of Labor Statistics (https://fraser.stlouisfed.org/series/1486) are available from Bulletin 1 (November 1895) to Bulletin 2299 (March 1988 *   The Commercial and Financial Chronicle (https://fraser.stlouisfed.org/title/1339), a weekly business newspaper, is available for 1871-1935 (with several gaps in coverage). *   The Financial… Continue Reading

EFF – How to: Avoid Phishing Attacks

EFF Surveillance Self Defense – “When an attacker sends an email or link that looks innocent, but is actually malicious, it’s called phishing. Phishing attacks are a common way that users get infected with malware—programs that hide on your computer and can be used to remotely control it, steal information, or spy on you. In… Continue Reading

HTTPS Windows exploit targets social security numbers, email addresses

Dan Goodin, arstechnica, August 3, 2016: “The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don’t have the ability to monitor a targeted end user’s Internet connection. The exploit is notable because it doesn’t… Continue Reading

New Freedom of Information Act Request Documents Released by ODNI

August 3, 2016 – Read the full “Proactive Disclosure” press release at DOJ.gov. “The Office of the Director of National Intelligence is one of seven federal agencies participating in a pilot program to make records requested via the Freedom of Information Act more readily available to the public, as reflected in the recently released Third… Continue Reading