Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

EFF – How To Enable Two-Factor Authentication on Gmail and Google

“…You can enable 2FA for your Gmail account on Google’s single settings page, so your new, more secure settings will apply across other Google services like Google Drive and Google+. Google calls it “two-step verification,” but the idea is exactly the same: if signing in requires something you have (like your phone) as well as… Continue Reading

Unreleased CIA assessment concludes Russia aided Trump

Washington Post – Secret CIA assessment says Russia was trying to help Trump win White House “The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the… Continue Reading

FOIA Lawsuits Mirror News Headlines And Increase 35 Percent

The FOIA Project at the Transactional Records Access Clearinghouse: “Very detailed court records of the near record 512 suits brought under the Freedom of Information Act in FY 2016 provide a detailed roadmap of how businesses, political groups, reporters and many others used the powerful law to achieve their widely varied goals. Court records obtained,… Continue Reading

100,000 android smartphones have backdoor hacking your data sending it to China

Secret Backdoor in Some U.S. Phones Sent Data to China, Analysts Say – “For about $50, you can get a smartphone with a high-definition display, fast data service and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72 hours. Security contractors recently discovered preinstalled software… Continue Reading

Mellon Foundation and Digital Preservation Coalition Sponsor Formation of Task Force for Email Archives

“The Andrew W. Mellon Foundation and the Digital Preservation Coalition announced the formation of a Task Force on Technical Approaches for Email Archives. The task force is charged with assessing current frameworks, tools, and approaches being taken toward these critical historical sources. Christopher Prom, assistant university archivist/Andrew S. G. Turyn Endowed Professor at the University of Illinois… Continue Reading

IRS IG – Review of the Enterprise E-Mail System Acquisition

Review of the Enterprise E-Mail System Acquisition, September 30, 2016. Reference Number: 2016-20-080. “The IRS purchased subscriptions for an enterprise e-mail system [Microsoft] that, as it turned out, it could not use. The purchase was made without first determining project infrastructure needs, integration requirements, business requirements, security and portal bandwidth, and whether the subscriptions were… Continue Reading

Fortune – Publishing Hacked Private Emails Can Be a Slippery Slope

“It may be hard for the media to resist a big email dump, but there are long-term risks. Regular dumps of classified documents and other internal communications have become a fixture of modern life, thanks in part to stateless—and frequently lawless—entities like WikiLeaks. But is publishing those leaks always the right thing to do? That’s… Continue Reading

NIST study – Security Fatigue

Security Fatigue, Issue No. 05 – Sept.-Oct. (2016 vol. 18) ISSN: 1520-9202 pp: 26-32 DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2016.84 “Security fatigue has been used to describe experiences with online security. This study identifies the affective manifestations resulting from decision fatigue and the role it plays in users’ security decisions. A semistructured interview protocol was used to collect… Continue Reading

Report – Yahoo scanned hundreds of millions of emails for gov surveillance

UK Guardian: “Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security… Continue Reading

District Court Judge releases list of more than 200 cases veiled in secrecy of Patriot Act

Washington Post – This judge just released 200 secret government surveillance requests “U.S. District Chief Judge Beryl A. Howell, a former Senate aide who helped draft the Patriot Act, has defied easy labeling throughout a decades-long career spent charting the frontier of technology and law in the nation’s capital….In ordering the first-ever release by a… Continue Reading

Vanity Fair – Welcome to the Dark Net

Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free “…Definitions. A vulnerability is a weakness in a network’s defenses. An exploit is a piece of software that takes advantage of a vulnerability. A zero-day exploit is a piece of software that takes advantage of a vulnerability that… Continue Reading

Newsweek – Between 2003 and 2009, the Bush White House “lost” 22 million emails

Gone but not forgotten, email messages lost, not archived, disappeared – at the highest level of government – written by officials from both parties, and lest we forget, this reminder by Nina Burleigh in Newsweek – “For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email… Continue Reading