Tuesday, June 25, 2013
I haven't seen anything to suggest that Snowden was involved in policy decisions or strategic decisions, so why would he have access to “everything NSA does?” Sounds more like a sales pitch than reality.
U.S. worried about security of files Snowden is thought to have
The ability of contractor-turned-fugitive Edward Snowden to evade arrest is raising new concerns among U.S. officials about the security of top-secret documents he is believed to have in his possession — and about the possibility that he could willingly share them with those who assist his escape.
… The NSA has teams of analysts scouring systems that they think Snowden may have accessed, officials said. Analysts are seeking to retrace his steps online and to assemble a catalogue of the material he may have taken. [I find that difficult to believe. It suggests that no one has control of Top Secret materials. Bob]
“They think he copied so much stuff — that almost everything that place does, he has,” said one former government official, referring to the NSA, where Snowden worked as a contractor for Booz Allen Hamilton while in the NSA’s Hawaii facility.
Perhaps they have another law that they interpret as allowing them to lie to mere citizens or to Congress unless in closed sessions?
Today, Senators Wyden and Udall wrote to General Alexander requesting corrections in a recent NSA fact sheet on surveillance authorities.
“In our judgement this inaccuracy is significant, as it portrays protections for Americans’ privacy being significantly stronger than they actually are,” wrote Wyden and Udall.
The Senators could not state exactly what those inaccuracies are because it relates to classified information, but they appended specifics in a classified attachment.
Sort of a summary. I haven't seen anyone specalizing in this area, but it should merit at least a class in law schools by now.
While the Internet has already provided for ways to remove your deceased loved one’s digital accounts, there is occasionally the need to access them. Sometimes it’s for will information – other times it has to deal with financial reasons.
… Below are a few tips to get you started in the right direction for gaining access to your deceased relative’s digital account. I can’t guarantee success, but I can say that these are good ways to move forward.
Security is making its way into the Boardroom...
The Escalating Cost of Software Malice
Malicious attacks by hackers: At first they were an irritating oddity, but they've surged so much over the past few years that now they're the most common cause of data breaches among U.S. companies. Because these incidents are hard to discover and combat, they're also now the most costly form of loss.
As part of HBR's "Data Under Siege" Insight Center, we present a few charts that show just how quickly malicious attacks, and their costs, are mounting. The most recent data comes from a 2013 study by the Ponemon Institute and Symantec of 277 companies that experienced losses or thefts of protected personal data.
(Related) We just graduated a few I can recommand...
Cyber Security Depends on Education
We're facing an eyebrow-raising talent shortfall in cyber security. Consider the findings of a recent inquiry by the UK's National Audit Office. Its report stressed not only that the current pool of security-educated graduates and practitioners falls far short of demand, but also that "it could take up to 20 years to address the skills gap."
(See our recent report here: Cybersecurity Education for the Next Generation.)
Is this what my students do, rather than homework?
Hey, it can't hurt!
The Federal Registry for Educational Excellence (FREE) has partnered with the Learning Registry to provide educators, parents, and students in the U.S. with more than 200,000 freely available resources online.