Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Citizens unredacted personal data concerning election fraud commission posted by White House

Follow up to resources with previous posting – States reject demand to provide all voter personal info to Trump election fraud commission – via Slate – White House Publishes Names, Emails, Phone Numbers, Home Addresses of Critics – “People who spoke up about their concerns over privacy suddenly found key private details, including their email and sometimes even home addresses, released by none other than President Donald Trump’s administration. The presidential commission charged with investigating alleged fraud that has been plagued by controversy from the start published a 112-page document of unredacted emails of public comment on its work, which to no surprise are largely negative of the Presidential Advisory Commission on Election Integrity. When it published the comments, the White House didn’t remove any of the personal information, meaning many of the comments are accompanied by personal details of the person who wrote it. “This cavalier attitude toward the public’s personal information is especially concerning given the commission’s request for sensitive data on every registered voter in the country,” Theresa Lee, a staff attorney for the American Civil Liberties Union’s Voting Rights Project, said. Lee was referring to the way the commission sent a letter to all the states requesting lots of personal information about voters. At least 45 states refused to hand over all the requested data…”

NYT As Elites Switch to Texting Watchdogs Fear Loss of Transparency

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency, Kevin Roose – “Lawmakers, executives and other leaders are turning to encrypted chat apps to keep their communications under wraps, causing problems in industries where careful record-keeping is standard procedure…Secure messaging apps like WhatsApp, Signal and Confide are making inroads among lawmakers, corporate executives and other… Continue Reading

Pew survey – Online Harassment 2017

“This study measures the prevalence and patterns of online harassment by examining six broad categories of abusive behavior (see “Defining online harassment” in the accompanying box). These categories are identical to those used in Pew Research Center’s 2014 examination of online harassment. They are designed to capture a broad range of experiences – not just… Continue Reading

New on LLRX – New ABA Email Guidelines: How Can Lawyers Comply?

Via LLRX.com – New ABA Email Guidelines: How Can Lawyers Comply? – Nicole Black advises lawyers on a range of applications and technology from which they can choose to establish standardized secure, encrypted email communications for all but the most extreme case-related interaction. Continue Reading

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist. May 12, 2017. [FAS] “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic… Continue Reading

24/7 Wall St – 15 Most Famous Cyberattacks of All Time

“The WannaCry ransomware attack has affected more than 200,000 computers in over 150 nations. The attack, which targets the Microsoft Windows operating system, has been described as one of the largest cyberattacks of all time. The malware encrypts files, demanding users of affected computers pay a ransom of $300 in bitcoin. The software behind WannaCry… Continue Reading

FTC updates consumers on ransomware

You’ve probably heard about the ransomware attack affecting organizations’ computer systems around the world. It seems to affect server software on organizations’ networked computers. But ransomware can attack anybody’s computer, so now is a good time to update your own operating system and other software. And then keep them up-to-date. The ransomware in the news… Continue Reading

State of the Phish 2017

This report is compiled data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12 month period, as well as an extensive survey of our database of infosec professionals. The report also includes survey data from thousands of end users in the UK and US that measured their… Continue Reading

Vendors approve of NIST password draft security recommendations – emojis welcome

Via CSO – “Standards group recommends removing periodic password change requirements – A recently released draft of the National Institute of Standards and Technology’s (NIST’s) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies… Continue Reading

Gallup – Email Outside of Working Hours Not a Burden to US Workers

“Checking email outside of normal business hours does not appear to be a burden for U.S. workers. About six in 10 workers say they check email outside of normal business hours. Of these, few claim the amount of emails they have to respond to during off hours is unreasonable, or that it negatively affects their… Continue Reading

Secure computing for journalists

Matthew Green: “…Classical (desktop and laptop) operating systems were designed primarily to support application developers. This means they offer a lot of power to your applications. An application like Microsoft Word can typically read and write all the files available to your account. If Word becomes compromised, this is usually enough to pwn you in practice. And in many cases,… Continue Reading

Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials “Go Dark”

Stewart, Daxton, Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials “Go Dark” (April 13, 2017). Available at SSRN: https://ssrn.com/abstract= “In the early weeks of the new presidential administration, White House staffers were communicating among themselves and leaking to journalists using apps such as Signal and Confide, which… Continue Reading