Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Implementation of IT Reform Law and Related Initiatives Can Help Improve Acquisitions

Information Technology: Implementation of IT Reform Law and Related Initiatives Can Help Improve Acquisitions, GAO-17-494T: Published: Mar 28, 2017. Publicly Released: Mar 28, 2017. “The Federal Information Technology Acquisition Reform Act (FITARA) was enacted in December 2014 to improve federal information technology (IT) acquisitions and can help federal agencies reduce duplication and achieve cost savings.… Continue Reading

CRS – Russia: Background and U.S. Interests

Russia: Background and U.S. Interests, March 1, 2017 (R44775) “Since 1991, Congress has played a key role in the development of U.S. policy toward the Russian Federation (Russia), the principal successor to the United States’ former superpower rival, the Soviet Union. In that time, U.S.-Russian relations have gone through positive and negative periods. Each new… Continue Reading

Paper – Cybersecurity, Identify Theft, and Standing Law

Chou, James C., Cybersecurity, Identify Theft, and Standing Law: A Framework for Data Breaches Using Substantial Risk in a Post-Clapper World (December 15, 2016). National Security Law Brief, Vol. 7, No. 1, 2016. Available at SSRN: https://ssrn.com/abstract=2938692 “Since Clapper v. Amnesty International USA, many courts have shut the door on victims alleging a heightened risk… Continue Reading

CRS – Dark Web

CRS report – Dark Web, Kristin Finklea, Specialist in Domestic Security. March 10, 2017. [via FAS] “The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines… Continue Reading

Perspective on WikiLeaks CIA Cache

The New York Times – The Truth About the WikiLeaks C.I.A. Cache – “On Tuesday morning [March 7, 2017] WikiLeaks released an enormous cache of documents that it claimed detailed “C.I.A. hacking tools.” Immediately afterward, it posted two startling tweets asserting that “C.I.A. hacker malware” posed a threat to journalists and others who require secure… Continue Reading

WikiLeaks posts redacted files purported to be hacked from CIA

Washington Post – WikiLeaks posts files it says are from the CIA’s computer hacking arsenal – “The anti-secrecy organization said the trove exceeded in scale and significance the massive collection of National Security Agency documents exposed by former U.S. intelligence contractor Edward Snowden. A statement from WikiLeaks indicated that it planned to post nearly 9,000… Continue Reading

Committee Democrats Introduce Three Bills to Improve Consumer Cybersecurity

“Today, Democratic members of the Energy and Commerce Committee introduced three bills to update U.S. cybersecurity policies and protect consumers.  In recent years, millions of Americans have had their personal data stolen and high profile attacks—like the denial-of-service (DDoS) attack on Dyn last year—have raised serious questions about our cybersecurity laws and our ability to… Continue Reading

Pence used personal email for state business – and was hacked

Indy Star – Pence used personal email for state business – and was hacked – “Vice President Mike Pence routinely used a private email account to conduct public business as governor of Indiana, at times discussing sensitive matters and homeland security issues. Emails released to IndyStar in response to a public records request show Pence… Continue Reading

Many ‘password challenged’ internet users don’t take steps that could protect their data

“In today’s digitally connected world, where accessing medical records, ordering groceries and paying taxes can all be done online, many internet users find it daunting to keep up with all the various passwords associated with their online accounts. One consequence is that a significant minority of users settle for less secure passwords they can more… Continue Reading

Nuts and Bolts of Encryption: A Primer for Policymakers

Nuts and Bolts of Encryption: A Primer for Policymakers, Edward W. Felten, Center for Information Technology Policy. Department of Computer Science, Woodrow Wilson School of Public and International Affairs, Princeton University, version of February 20, 2017. An up-to-date version of this paper will be available at https://www.cs.princeton.edu/~felten/encryptionprimer.pdf “This paper offers a straight for ward introduction… Continue Reading

Botnet attack analysis of Deflect protected website blacklivesmatter.com

Deflect Labs report #3. Seamus Tuohy and eQualit.ie View the report with 3D rendering (5mb) “This report covers attacks between April 29th and October 15th, 2016. Over this seven-month period, we recorded more than a hundred separate denial-of-service incidents against the official Black Lives Matter website. Our analysis shows a variety of technical methods used… Continue Reading

Cybersecurity: Actions Needed to Strengthen U.S. Capabilities

Cybersecurity: Actions Needed to Strengthen U.S. Capabilities, GAO-17-440T: Published: Feb 14, 2017. Publicly Released: Feb 14, 2017. “GAO has consistently identified shortcomings in the federal government’s approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII). While previous… Continue Reading