Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions

Behind the Cyberlocker Door: A Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions A NetNames Report for Digital Citizens Alliance “As a society, we can no longer shrug off content theft as the isolated activity of high school and college students who want to watch a movie or listen to… Continue Reading

Govt posts Request for Quotations in response to massive employee data breach

FCW.com -“At long last, vendors can size up the official requirements for protecting the identities of 21.5 million affected by the Office of Personnel Management background check breach. The full load could be more like 28 million, and whoever wins will have to let the feds inside their own databases. Quotations are due Aug. 14… Continue Reading

White Paper – Comparing Expert and Non-Expert Security Practices

Google Online Security Blog: “Today, you can find more online security tips in a few seconds than you could use in a lifetime. While this collection of best practices is rich, it’s not always useful; it can be difficult to know which ones to prioritize, and why. Questions like ‘Why do people make some security… Continue Reading

Handing Over the Keys to the Castle

Handing Over the Keys to the Castle – OPM Demonstrated that Antiquated Security Practices Harm National Security. Institute for Critical Infrastructure Technology. July 2015. “In this digital age, information is secured, coveted, and exfiltrated by nation states, hacktivists, and ambitious actors because, now more than ever, knowledge is power. Modern needs dictate that only authorized… Continue Reading

GAO Report – Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies

Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies, GAO-15-725T: Published: Jun 24, 2015. Publicly Released: Jun 24, 2015 “GAO has identified a number of challenges federal agencies face in addressing threats to their cybersecurity, including the following: Designing and implementing a risk-based cybersecurity program. Enhancing oversight of contractors providing IT services.… Continue Reading

State-by-State Listing of Data Loss and Freedom of Information Legislation

DataLossDB – Open Security Foundation: “In order to request data breach notification reports from governments, several critieria need to exist. The state must have Freedom of Information or Open Records legislation. The state must have Breach Notification legislation, and the state must require notifications to a centralized authority (like an Attorney General, or a Consumer… Continue Reading

New Study – Americans Losing Battle on Privacy Rights

The Tradeoff Fallacy – How Marketers Are Misrepresenting American Consumers and Opening Them Up to Exploitation – Joseph Turow, Ph.D.; Michael Hennessy, Ph.D; Nora Draper, Ph.D. June 2015. A Report from the Anneberg School for Communication, University of Pennsylvania. “New Annenberg survey results indicate that marketers are misrepresenting a large majority of Americans by claiming that… Continue Reading

FTC – OPM data breach – what should you do?

Lisa Weintraub Schifferle – Attorney, FTC Division of Consumer and Business Education – “A data breach at the Office of Personnel Management (OPM) – and you’re a current or former federal employee whose personal information may have been exposed. What should you do? Take a deep breath. Here are the steps to take. First Step… Continue Reading

New One-Stop Resource for Identity Theft Victims

“News about data breaches at banks, stores, and agencies is an everyday occurrence now. But if your private information has been compromised, it doesn’t feel commonplace to you. The sooner you find out, and begin damage control, the better off you’ll be. IdentityTheft.gov, a new website, offers step-by-step checklists of what to do right away,… Continue Reading

Wham, Bam, Thank You Spam! Don’t Click on the Link!

Harvard Law School Forum on Corporate Governance and Financial Regulation  – Posted by Paul A. Ferrillo, Weil, Gotshal & Manges LLP, May 17, 2015. “It seems that just like in old times (in cyberspace that means last year) the existence of “snake-oil” salesmen on the Internet is getting worse, not better. Rather than selling something… Continue Reading

FTC – Recovering from identity theft is easier with a plan

“IdentityTheft.gov is the federal government’s one-stop resource for identity theft victims. The site provides streamlined checklists and sample letters to guide you through the recovery process.” What To Do Right Away What To Do Next Other Steps Know Your Rights Sample Letters Warning signs of identity theft What to do if your info is lost… Continue Reading

What Is the Internet of Things?

What Is the Internet of Things?, Mike Loukides and Jon Bruner, O’Reilly Media:  “The Internet of Things (IoT) is a blending of software and hardware, introducing intelligence and connectedness to objects and adding physical endpoints to software. Radical changes in the hardware development process have made the IoT—and its vast possibility—accessible to anyone. This report provides… Continue Reading