Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

New Initiative by Hillary Clinton and Mitt Romney – Defending Digital Democracy

The Washington Post: “The former managers of Hillary Clinton and Mitt Romney’s presidential campaigns are leading a new initiative called ‘Defending Digital Democracy’ in the hopes of preventing a repeat of Russia’s 2016 election interference. Robby Mook, Clinton’s 2016 campaign chief, and Matt Rhoades, who managed the 2012 run of GOP nominee Romney, are heading up the project at the Harvard Kennedy School’s Belfer Center for Science and International Affairs in one of the first major efforts outside government to grapple with 21st century hacking and propaganda operations — and ways to deter them…”

Paper – Metadata: The Most Potent Weapon in This Cyber War

Institute for Critical Infrastructure Technology – “Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social… Continue Reading

Report – 66% of US law firms reported a breach in 2016

NetSecurity – “The majority of US-based law firms are not only exposed in a wide variety of areas, but in many cases, unaware of intrusion attempts. These findings were based on Logicforce survey data from over 200 law firms, anonymous system monitoring data and results from their on-site assessments. The degree of preparation and vigilance… Continue Reading

Personal data of millions of Verizon customers exposed in cyber breach

Public Knowledge Urges FCC to Investigate Verizon Customer Data Breach – “Today, reports indicate that one of Verizon’s business partners, Nice Systems, exposed millions of Verizon customer records. According to ZDNet, “as many as 14 million records of subscribers who called [Verizon’s] customer services in the past six months were found on an unprotected Amazon S3… Continue Reading

Global Study – The need for a new IT security architecture

“Cyber-attacks happen by the minute—and in our industry on the whole, they’re not being handled adequately. To get a better view of why that is, Citrix teamed up with the Ponemon Institute to find out what’s holding up businesses from appropriately addressing security issues. Here’s what we found and how businesses can take smarter steps… Continue Reading

IG Audit of OPM IT Systems – Follow on to massive breach of employee data

Follow up to previous posting of November 2016 – Audit of OPM Security Systems Shows Continued Material Weakness – an update via NextGov: “More than two years after suffering a massive data beach [of over 20 million current and past federal employee personal data], the Office of Personnel Management still isn’t sufficiently vetting many of… Continue Reading

Cybersecurity: The cold war online

Cybersecurity: The cold war online, Steven Aftergood. Nature 547, 30–31 (06 July 2017) doi:10.1038/547030a. Published online 05 July 2017. “The Internet is under attack, and not just by hackers, thieves and spies. As Alexander Klimburg reports in The Darkening Web, governments that insist on their own primacy are increasingly assaulting the idea of this digitized… Continue Reading

Black Hat USA Report – Portrait of an Imminent Cyberthreat

July 2017 Portrait of an Imminent Cyberthreat – Cyber attacks on US enterprises and critical infrastructure are coming soon, according to some of the industry’s most experienced and highly informed security professionals. And in most cases, defenders are not prepared. “Most information security professionals believe that the US critical infrastructure will be breached by a… Continue Reading

ABA – Cloud Ethics Opinions Around the U.S.

ABA Law Practice Division – “Cloud Ethics Opinions – There’s a compelling business case for cloud computing, but can lawyers use it ethically? We’ve compiled these comparison charts to help you make the right decision for your practice. What is Cloud Computing? About This Map Broadly defined, cloud computing (or “Software as a Service”) refers to… Continue Reading

Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified

Treasury Inspector General for Tax Administration – The Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified, June 20, 2017, Reference Number: 2017-40-031.”Employment-related identity theft (hereafter referred to as employment identity theft) occurs when an identity thief uses another person’s identity to gain employment. Taxpayers may first realize they are a victim when… Continue Reading

IC3 Issues Internet Crime Report for 2016

“The Internet Crime Complaint Center (IC3) has released its 2016 Internet Crime Report, describing the numbers and types of cyber crimes reported to IC3. Business Email Compromise (BEC), ransomware attacks, tech support fraud, and extortion are all common schemes affecting people in the U.S. and around the world. US-CERT encourages users to review the 2016… Continue Reading

Unisys Security Index™ U.S.

“The Unisys Security Index measures concerns of consumers on issues related to national, personal, financial and internet security around the world. In the U.S., the greatest increase in concern since 2014 was in the area of internet security: 51%. Learn more about concerns in the other areas.” Continue Reading