Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

American Library Association gathering support to protect user metadata and privacy

The Hill, Kate Tummarello: “…You need to have some freedom to learn about what you think is important without worrying about whether it ends up in some FBI file,” said Alan Inouye, director of the Office for Information Technology Policy at the American Library Association (ALA). Government snooping of libraries has a long history. Under the PatriotContinue Reading

What the Government Does with Americans’ Data

What the Government Does with Americans’ Data, by Rachel Levinson-Waldman, October 8, 2013. “After the attacks of September 11, 2001, the government’s authority to collect, keep, and share information about Americans with little or no basis to suspect wrongdoing dramatically expanded. While the risks and benefits of this approach are the subject of intense debate,Continue Reading

Guardian – NSA, GCHQ target Tor network that protects anonymity of web users

One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers by James Ball, Bruce Schneier and Glenn Greenwald “The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite theContinue Reading

Cyberattack on Adobe includes information on 2.9 million customers

Adobe Blog – “Cyber attacks are one of the unfortunate realities of doing business today. Given the profile and widespread use of many of our products, Adobe has attracted increasing attention from cyber attackers. Very recently, Adobe’s security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well asContinue Reading

NYT – Selling Secrets of Phone Users to Advertisers

Selling Secrets of Phone Users to Advertisers – by Claire Cain Miller and Somini Sengupta,  October 5, 2013 “Now, smartphones know everything — where people go, what they search for, what they buy, what they do for fun and when they go to bed. That is why advertisers, and tech companies like Google and Facebook,Continue Reading

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources. Rita Tehan, Information Research Specialist, September 20, 2013 “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrialContinue Reading

Phishing Activity Trends Report – 1st Qtr 2013

“The APWG Phishing Activity Trends Report [published July 23, 2013] analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website, and by e-mail submissions to APWG also measures the evolution, proliferation , and propagation of crimeware by drawing from the research of our member companies.Continue Reading

NBC Reports – “How Snowden did it”

Richard Esposito and Matthew Cole, NBC News: “When Edward Snowden stole the crown jewels of the National Security Agency, he didn’t need to use any sophisticated devices or software or go around any computer firewall. All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gapingContinue Reading

IRS IG – Desktop and Laptop Software License Management Is Not Being Adequately Performed

Desktop and Laptop Software License Management Is Not Being Adequately Performed, Treasury Inspector General for Tax Administration, June 25, 2013. Reference Number: 2013-20-025. “The IRS is not adequately performing software license management and is not adhering to Federal requirements and recommended industry best practices. The IRS does not have enterprisewide or local policies, procedures, andContinue Reading

Cory Doctorow: privacy, oversharing and government surveillance

Cory Doctorow: “The European Parliament is currently involved in a wrangle over the new General Data Protection Regulation. At stake are the future rules for online privacy, data mining, big data, governmental spying (by proxy), to name a few. Hundreds of amendments and proposals are on the table, including some that speak of relaxing theContinue Reading

Commentary – Math Advances Raise the Prospect of an Internet Security Crisis

Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years, by Tom Simonite on August 2, 2013. Technology Review.”Cryptographic schemes protect vast quantities of financial and personal information. The encryption systems used to secure online bank accounts and keep critical communications private could be undone inContinue Reading

Ponemon 2013 Live Threat Intelligence Impact Report

“We are pleased to announce the release of a new study, Live Threat Intelligence Impact Report 2013, that reveals the facts behind the impact that weak intelligence can have on organizations and why the ability to quickly gather, analyze and use actionable intelligence is essential to cyber defense. According to the study sponsored by Norse,Continue Reading