Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

Fourth Annual Benchmark Study on Patient Privacy and Data Security

Ponemon Institute: “…we are releasing our Fourth Annual Benchmark Study on Patient Privacy and Data Security. We hope you will read the report sponsored by ID Experts that reveals some fascinating trends. Specifically, criminal attacks on healthcare systems have risen a startling 100 percent since we first conducted the study in 2010. This year, we found the… Continue Reading

New on LLRX – $38 Datawind UbiSlate 7Ci tablet as an e-reader

Via LLRX.com – $38 Datawind UbiSlate 7Ci tablet as an e-reader: Avoid this adware trap despite its many positives! David Rothman is spearheading chronicling the progress of expanding low cost access to e-readers as libraries engage in mission critical outreach efforts to reach underserved communities. In this article, Rothman asks: Suppose you could buy an iPad for $38, read… Continue Reading

Report – Encryption Would Have Stopped Snowden From Using Secrets

Chris Strohm, Bloomberg: “Edward Snowden could have been thwarted from leaking classified U.S. documents if the National Security Agency encrypted the information to make it unreadable, two former senior cybersecurity officials said. Snowden would have needed a digital key to decipher the secrets after gaining access to them if the data was scrambled, Ira “Gus” Hunt, former… Continue Reading

Leaked Documents Reveal Government Cyber Attacks on Hactivists

NBC News – MARK SCHONE, RICHARD ESPOSITO, MATTHEW COLE AND GLENN GREENWALD: “Secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unit… Continue Reading

New Report Focuses on Disaster Unpreparedness

Meritalk report [presentation] [snipped]: •”Federal IT professionals give themselves high DR2 grades: •One in four give their agency an “A” in DR2 preparedness and nearly all give a passing grade •Despite the high marks, many agencies fail to test their data recovery capabilities: •In the last 12 months, only 54% of agencies have tested their… Continue Reading

The Cost of Surveillance

Via Ashkan Soltani: “The Yale Law Journal Online (YLJO) just published an article that Ashkan Soltani co-authored with Kevin Bankston (first workshopped at the Privacy Law Scholars Conference last year) entitled Tiny Constables and the Cost of Surveillance: Making Cents Out of United States v. Jones. In it, we discuss the drastic reduction in the cost of tracking an individual’s location and show how technology has greatly… Continue Reading

Review Group on Intelligence and Communications Technologies Presents Report to President Obama

Transmittal Letter from Richard A. Clarke; Michael J. Morell; Geoffrey R. Stone; Cass R. Sunstein; Peter Swire – “Dear Mr. President: We are honored to present you with the Final Report of the Review Group on Intelligence and Communications Technologies – Liberty and Security in a Changing World. Consistent with your memorandum of August 27, 2013, our recommendations… Continue Reading

American Library Association gathering support to protect user metadata and privacy

The Hill, Kate Tummarello: “…You need to have some freedom to learn about what you think is important without worrying about whether it ends up in some FBI file,” said Alan Inouye, director of the Office for Information Technology Policy at the American Library Association (ALA). Government snooping of libraries has a long history. Under the Patriot… Continue Reading

What the Government Does with Americans’ Data

What the Government Does with Americans’ Data, by Rachel Levinson-Waldman, October 8, 2013. “After the attacks of September 11, 2001, the government’s authority to collect, keep, and share information about Americans with little or no basis to suspect wrongdoing dramatically expanded. While the risks and benefits of this approach are the subject of intense debate,… Continue Reading

Guardian – NSA, GCHQ target Tor network that protects anonymity of web users

One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers by James Ball, Bruce Schneier and Glenn Greenwald “The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the… Continue Reading

Cyberattack on Adobe includes information on 2.9 million customers

Adobe Blog – “Cyber attacks are one of the unfortunate realities of doing business today. Given the profile and widespread use of many of our products, Adobe has attracted increasing attention from cyber attackers. Very recently, Adobe’s security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well as… Continue Reading

NYT – Selling Secrets of Phone Users to Advertisers

Selling Secrets of Phone Users to Advertisers – by Claire Cain Miller and Somini Sengupta,  October 5, 2013 “Now, smartphones know everything — where people go, what they search for, what they buy, what they do for fun and when they go to bed. That is why advertisers, and tech companies like Google and Facebook,… Continue Reading