Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

CEA Report: The Cost of Malicious Cyber Activity to US Economy

[February 16, 2018] “the Council of Economic Advisers (CEA) released a report detailing the economic costs of malicious cyber activity on the U.S. economy. Please see below for the executive summary and read the full report here. This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are… Continue Reading

Interagency Report on Status of International Cybersecurity Standardization for Internet of Things

NIST: Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) – “The Interagency International Cybersecurity Standardization Working Group (IICS WG) has developedthis draft report based upon the information available to the participating agencies. Comments arebeing solicited in order to augment that information, especially on the information about the state of… Continue Reading

Thousands of US, UK government, academic websites hijacked

The Register: “Thousands of websites around the world – from the UK’s NHS and ICO to the US government’s court system – were today secretly mining crypto-coins on netizens’ web browsers for miscreants unknown. The affected sites all use a fairly popular plugin called Browsealoud, made by Brit biz Texthelp, which reads out webpages for… Continue Reading

Pete Weiss recommends: weekly highlights on cyber issues

Via LLRX – Pete Weiss recommends: weekly highlights on cyber issues – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis, Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy… Continue Reading

State of the States 2018: Broadband, Cybersecurity Surface as Priorities

GovTech.com: “With a wave of gubernatorial elections on the horizon later this year, many states’ top elected leaders were nearing the end of their terms as they delivered their most important policy speech of the year, the State of the State address. So understandably, many seized the opportunity to reflect on their accomplishments while in… Continue Reading

EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World

“The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign infecting thousands of people in more than 20 countries. Hundreds of gigabytes of data has been stolen, primarily through mobile devices compromised by fake secure messaging clients. The trojanized apps, including Signal and WhatsApp, function like the legitimate… Continue Reading

CRS – Transatlantic Relations in 2018

Transatlantic Relations in 2018. January 10, 2018. IN10847. “As the second year of the Trump Administration begins, a degree of uncertainty lingers over transatlantic relations. The U.S.-European partnership could face challenges in 2018. Following the election of President Trump, numerous European officials and analysts expressed concern about the future trajectory of U.S.-European relations, particularly the… Continue Reading

Report to President on Enhancing Resilience of Internet and Communications Ecosystem Against Botnets and Distributed Threats

“This draft report responds to the May 11, 2017, Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. That order called for “resilience against botnets and other automated, distributed threats,” directing the Departments of Commerce and Homeland Security to “lead an open and transparent process to identify and promote action by appropriate… Continue Reading

Law, Metaphor and the Encrypted Machine

Gill, Lex, Law, Metaphor and the Encrypted Machine (2017). Available at SSRN: https://ssrn.com/abstract=2933269 – “The metaphors we use to imagine, describe and regulate new technologies have profound legal implications. This paper offers a critical examination of the metaphors we choose to describe encryption technology in particular, and aims to uncover some of the normative and legal… Continue Reading

U.S. Army Concept for Cyberspace and Electronic Warfare Operations 2025-2040

The U.S. Army Concept for Cyberspace and Electronic Warfare Operations 2025-2040, CRS report via FAS. “TRADOC Pamphlet 525-8- 6, The U.S. Army Concept for Cyberspace and Electronic Warfare Operations expands on the ideas presented in TRADOC Pamphlet 525-3- 1, The U.S. Army Operating Concept: Win in a Complex World (AOC). This document describes how the… Continue Reading

Bill Would Establish Cybersecurity Inspections, Impose Mandatory Penalties, and Compensate Consumers for Stolen Data

“United States Senators Elizabeth Warren (D-Mass.) and Mark Warner (D-Va.) today introduced the Data Breach Prevention and Compensation Act to hold large credit reporting agencies (CRAs) – including Equifax – accountable for data breaches involving consumer data. The bill would give the Federal Trade Commission (FTC) more direct supervisory authority over data security at CRAs,… Continue Reading

What is the U.S. Digital Registry?

“Whether for access to emergency, financial or education public services, users need to trust they are engaging with official U.S. government digital accounts. To help prevent exploitation from unofficial sources, phishing scams, or malicious entities, the U.S. Digital Registry serves as a crowdsource resource for agencies, citizens, and developers to confirm the official status of… Continue Reading