Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

EY, LANL make new cybersecurity tools available to private sector

News release: “Ernst & Young LLP and Los Alamos National Laboratory have formed a strategic alliance to deliver some of the most advanced behavioral cybersecurity tools available to the commercial market. “Cybersecurity attacks are ever more frequent and more sophisticated, and they destroy the trust needed to conduct business,” said Duncan McBranch, Chief Technology Officer at Los Alamos National Laboratory. “Every organization must improve its ability to detect and stop attacks as they occur, and before secure data is compromised. This unique relationship with EY will improve our ability to develop and test adaptive cybersecurity technologies across both industry and government networks.  Defensive cybersecurity is an area that requires strong public-private partnerships to shift the balance.” The alliance comes at a watershed moment when increasingly sophisticated cyberattacks are inflicting significant economic, social and even political damage to US organizations. The tools developed by Los Alamos and delivered to the private sector exclusively by Ernst & Young LLP can help counter these threats by detecting them before they do deep and lasting damage. “We are very excited to be working with Los Alamos as part of our overall mission to transition their heritage of national cybersecurity and innovation to the private sector, and arming our clients with the most advanced tools and resources to combat cyber-threats, said Bob Patton, EY Americas Advisory Vice Chair. This collaborative approach is reflective of our global strategy to help organizations manage cybersecurity better and doing our part to build a better working world.”

FCW obtained official timeline of OPM data breach

FCW.com: “An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data and the government’s step-by-step response. It illuminates a sequence of events that lawmakers have struggled to pin down in public hearings with Obama administration officials. The timeline makes clear that the heist of dataContinue Reading

Mandatory Minimum Sentencing: Federal Aggravated Identity Theft

CRS report vai FAS – Mandatory Minimum Sentencing: Federal Aggravated Identity Theft – Charles Doyle, Senior Specialist in American Public Law. August 20, 2015. “Aggravated identity theft is punishable by a mandatory minimum sentence of imprisonment for two years or by imprisonment for five years if it relates to a terrorism offense. At least thusContinue Reading

Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions

Behind the Cyberlocker Door: A Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions A NetNames Report for Digital Citizens Alliance “As a society, we can no longer shrug off content theft as the isolated activity of high school and college students who want to watch a movie or listen toContinue Reading

Govt posts Request for Quotations in response to massive employee data breach

FCW.com -“At long last, vendors can size up the official requirements for protecting the identities of 21.5 million affected by the Office of Personnel Management background check breach. The full load could be more like 28 million, and whoever wins will have to let the feds inside their own databases. Quotations are due Aug. 14Continue Reading

White Paper – Comparing Expert and Non-Expert Security Practices

Google Online Security Blog: “Today, you can find more online security tips in a few seconds than you could use in a lifetime. While this collection of best practices is rich, it’s not always useful; it can be difficult to know which ones to prioritize, and why. Questions like ‘Why do people make some securityContinue Reading

Handing Over the Keys to the Castle

Handing Over the Keys to the Castle – OPM Demonstrated that Antiquated Security Practices Harm National Security. Institute for Critical Infrastructure Technology. July 2015. “In this digital age, information is secured, coveted, and exfiltrated by nation states, hacktivists, and ambitious actors because, now more than ever, knowledge is power. Modern needs dictate that only authorizedContinue Reading

GAO Report – Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies

Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies, GAO-15-725T: Published: Jun 24, 2015. Publicly Released: Jun 24, 2015 “GAO has identified a number of challenges federal agencies face in addressing threats to their cybersecurity, including the following: Designing and implementing a risk-based cybersecurity program. Enhancing oversight of contractors providing IT services.Continue Reading

State-by-State Listing of Data Loss and Freedom of Information Legislation

DataLossDB – Open Security Foundation: “In order to request data breach notification reports from governments, several critieria need to exist. The state must have Freedom of Information or Open Records legislation. The state must have Breach Notification legislation, and the state must require notifications to a centralized authority (like an Attorney General, or a ConsumerContinue Reading

New Study – Americans Losing Battle on Privacy Rights

The Tradeoff Fallacy – How Marketers Are Misrepresenting American Consumers and Opening Them Up to Exploitation – Joseph Turow, Ph.D.; Michael Hennessy, Ph.D; Nora Draper, Ph.D. June 2015. A Report from the Anneberg School for Communication, University of Pennsylvania. “New Annenberg survey results indicate that marketers are misrepresenting a large majority of Americans by claiming thatContinue Reading

FTC – OPM data breach – what should you do?

Lisa Weintraub Schifferle – Attorney, FTC Division of Consumer and Business Education – “A data breach at the Office of Personnel Management (OPM) – and you’re a current or former federal employee whose personal information may have been exposed. What should you do? Take a deep breath. Here are the steps to take. First StepContinue Reading

New One-Stop Resource for Identity Theft Victims

“News about data breaches at banks, stores, and agencies is an everyday occurrence now. But if your private information has been compromised, it doesn’t feel commonplace to you. The sooner you find out, and begin damage control, the better off you’ll be. IdentityTheft.gov, a new website, offers step-by-step checklists of what to do right away,Continue Reading