Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Twitter releases large data archive of potentially state-backed information operations

Twitter news release on Election Integrity: “Data archive In line with our principles of transparency and to improve public understanding of alleged foreign influence campaigns, Twitter is making publicly available archives of Tweets and media that we believe resulted from potentially state-backed information operations on our service…While this dataset is of a size that a degree of capability for large dataset analysis is required, we hope to support broad analysis by making a public version of these datasets (with some account-specific information hashed) available. You can download the datasets below. No content has been redacted. Specialist researchers can request access to an unhashed version of these datasets, which will be governed by a data use agreement that will include provisions to ensure the data is used within appropriate legal and ethical parameters.

What’s included?Our initial disclosures cover two previously disclosed campaigns, and include information from 3,841 accounts believed to be connected to the Russian Internet Research Agency, and 770 accounts believed to originate in Iran. For additional information about this disclosure, see our announcement. These datasets include all public, nondeleted Tweets and media (e.g., images and videos) from accounts we believe are connected to state-backed information operations. Tweets deleted by these users prior to their suspension (which are not included in these datasets) comprise less than 1% of their overall activity. Note that not all of the accounts we identified as connected to these campaigns actively Tweeted, so the number of accounts represented in the datasets may be less than the total number of accounts listed here…”

FBI Releases Article on Defending Against Payroll Phishing Scams

US-CERT: “The Federal Bureau of Investigation (FBI) has released an article on building a digital defense against phishing scams targeting electronically deposited paychecks. In these schemes, scammers use phishing emails to direct employees to fraudulent websites and collect their work credentials. Scammers then use victims’ credentials to replace legitimate direct deposit information with their own… Continue Reading

From Canada to Argentina, Security Researchers Have Rights—Our New Report

“EFF is introducing a new Coders’ Rights project to connect the work of security research with the fundamental rights of its practitioners throughout the Americas. The project seeks to support the right of free expression that lies at the heart of researchers’ creations and use of computer code to examine computer systems, and relay their… Continue Reading

‘Do Not Track,’ the Privacy Tool Used by Millions of People, Doesn’t Do Anything

Gizmodo: “When you go into the privacy settings on your browser, there’s a little option there to turn on the “Do Not Track” function, which will send an invisible request on your behalf to all the websites you visit telling them not to track you. A reasonable person might think that enabling it will stop… Continue Reading

Slack Doesn’t Have End-to-End Encryption Because Your Boss Doesn’t Want It

Motherboard: A former Slack employee and the company’s current chief information security officer say that Slack’s paying customers aren’t that interested in end-to-end encryption. “End-to-end encryption—where keys are stored on individual devices by users, meaning only the intended recipients can read message content—is continuing to spread across messaging platforms. But work communication service Slack has… Continue Reading

New on LLRX for September and part of October

If you are not checking in on Pete’s weekly column on cyber security issues and privacy on LLRX – please take some time to read about what you are missing! Privacy and security issues impact every aspect of our lives – home, work, travel, education, healthcare and medical issues, to name but a few. On… Continue Reading

Expert attorneys command 4 figure hourly billing fees

The Business Journals [paywall]: “Boston-based Ropes & Gray partner Douglas Meal, one of the most sought-after data privacy and cybersecurity attorneys in the country, typically charges $1,550 an hour for his services, according to a recent court filing. The filing offers a rare public glimpse into what some of the attorneys at Boston’s largest law… Continue Reading

DOD Just Beginning to Grapple with Scale of Cybersecurity Vulnerabilities

FCW.com: GAO hacks DOD weapons systems, calls out weak cyber Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities. GAO-19-128: Published: Oct 9, 2018. Publicly Released: Oct 9, 2018. “DOD’s weapons are more computerized and networked than ever before, so it’s no surprise that there are more opportunities for attacks. Yet until… Continue Reading

Law firms can learn from other industries’ missteps on cybersecurity awareness and prevention

ABA Journal – “Equifax. Yahoo. Anthem. Sony. In the past few years, these companies experienced some of the most significant data breaches to date. And all of these companies found themselves subject to intense worldwide media coverage over their failure to secure their information. The industries affected—from health care to entertainment—know all too well that… Continue Reading

Google+ shutting down after belated news of consumer data breach

Google Blog: “Many third-party apps, services and websites build on top of our various services to improve everyone’s phones, working life, and online experience. We strongly support this active ecosystem. But increasingly, its success depends on users knowing that their data is secure, and on developers having clear rules of the road. Over the years… Continue Reading

Voice Phishing Scams Are Getting More Clever

Krebs on Security: “Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you’re too smart to fall for one? Think again:… Continue Reading

Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds

WSJ [paywall]- The flaw in Election Systems & Software’s Model 650 high-speed ballot-counting machine was detailed in 2007 “Election machines used in more than half of U.S. states carry a flaw disclosed more than a decade ago that makes them vulnerable to a cyberattack, according to a report to be delivered Thursday on Capitol Hill.… Continue Reading