Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Records

NSA collected and stored social media, email, chats of non targeted Americans

Via The Atlantic – “The Washington Post’s latest article drawing on Snowden’s leaked cache of documents includes files “described as useless by the analysts but nonetheless retained” that “tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000Continue Reading

EPIC Urges Investigation of “Always On” Consumer Devices

“EPIC has asked the Federal Trade Commission and the Department of Justice to conduct a workshop on ‘Always-On’ Consumer Devices. EPIC described the increasing presence of internet-connected devices in consumer’s homes, such as TVs, toys, and thermostats, that routinely record and store private communications. EPIC urged the agencies to conduct a comprehensive investigation to determineContinue Reading

History of the internet – 40 maps and key resources

For all those who do not recollect or may not know how the internet evolved from ARPANET in 1969 to the web of 2015 with its data analytics, e-commerce profiling and of course, global surveillance, I recommend 40 maps that explain the internet by Timothy B. Lee via Vox, posted on June 2, 2014: “TheContinue Reading

Information about OPM Cybersecurity Incidents

“OPM –  This site will be updated regularly. What happened How you may be affected What you can do What we are doing to help Frequently Asked Questions What Happened? OPM recently discovered two separate but related cyber-security incidents that have impacted the data of Federal government employees, contractors, and others: In April 2015, OPMContinue Reading

Commentary – Why Protecting Data Privacy Matters, and When

Data Science Central – (A Wake-Up Call to Data Geeks Who Doubt) by Anne Russell “It’s official. Public concerns over the privacy of data used in digital approaches have reached an apex. Worried about the safety of digital networks, consumers want to gain control over what they increasingly sense as a loss of power overContinue Reading

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance

Swire, Peter. The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance. Working Paper GTJMCE 2015-1. Sam Nunn School of International Affairs  – Georgia Institute of Technology. “In June 2015, the Congress adopted and President Obama signed the USA Freedom Act, the biggest pro-privacy change to U.S. intelligence law in nearly 40Continue Reading

Harvard Hacked

“On June 19, Harvard discovered an intrusion on the Faculty of Arts and Sciences and Central Administration information technology networks. Since discovering this intrusion, Harvard has been working with external information security experts and federal law enforcement to investigate the incident, protect the information stored on our systems, and strengthen IT environments across the University.Continue Reading

NSA global surveillance network knows all?

Two Part Series from The Intercept [Part 1 – XKEYSCORE: NSA’s Google for the World’s Private Communications] and Part 2 – Behind the Curtain A Look at the Inner Workings of NSA’s XKEYSCORE “The sheer quantity of communications that XKEYSCORE [global Internet surveillance network run by NSA] processes, filters and queries is stunning. Around theContinue Reading

Unisys Security Insights – Report for US

“Consumers in the U.S. are most concerned about data breaches at retailers and government agencies. U.S. consumers indicated relatively lower levels of concern about data breaches at other organizations such as airlines, healthcare and telecom companies. Interestingly, the perceived threat of data breaches is low for banks and utilities, possibly reflecting traditional high levels ofContinue Reading

GAO – Bank and Other Depository Regulators Need Better Data Analytics

Cybersecurity: Bank and Other Depository Regulators Need Better Data Analytics and Depository Institutions Want More Usable Threat Information, GAO-15-509: Published: Jul 2, 2015. Publicly Released: Jul 2, 2015. “Regulators use a risk-based examination approach to oversee the adequacy of information security at depository institutions—banks, thrifts, and credit unions—but could better target future examinations by analyzingContinue Reading

Secret court authorizes continued telephone metadata collection

The Guardian UK: “After a decade in the shadows, a secretive surveillance court that authorises the bulk collection of American telephone records seized on its last chance to show off a little personality on Tuesday [June 30, 2015]. “Plus ça change, plus c’est la même chose, well, at least for 180 days,” wrote judge MichaelContinue Reading

OPM – Actions to Strengthen Cybersecurity and Protect Critical IT Systems

“The recent intrusions into U.S. Office of Personnel Management (OPM) systems that house personnel and background investigation data for Federal employees and other individuals have raised questions about the security of OPM data and the integrity of its Information Technology (IT) assets. Since Director Archuleta arrived at OPM, she has led the agency in takingContinue Reading