Sunday, October 18, 2015

Seems to suggest law enforcement does not know how to get the data they want.
Microsoft Launches New Transparency Website
Microsoft this week announced the launch of a new transparency website aimed at offering access to various transparency reports published by the company.
The new Microsoft Transparency Hub includes a report offering information on requests that the tech giant receives from different parties seeking the removal of online content. The website also provides users with access to the Law Enforcement Requests Report and U.S. National Security Orders Report, which cover the first six months of this year.
The reports offer details on requests received for customer data in the aforementioned period, showing a slight increase when compared to the last six months of 2014. However, orders from the United States Foreign Intelligence Surveillance Court are not included in the report, as they are subject to a six-month reporting delay.
The company revealed that law enforcement agencies made 35,228 requests for customer information during the first six months of the year, and that 72.7 percent of them came from organizations in five countries, namely United States, United Kingdom, Turkey, France and Germany. However, the Redmond-based giant notes that only 3 percent of the requests resulted in disclosed content.
Last month, Yahoo! revealed that it had received 15,583 requests for user data in the first half of 2015, while Amazon in June confirmed 1,000 requests for the first five months of the year.
[From the web page:
Microsoft does not disclose customer content without a court order or warrant.
The total number of requests rejected for not meeting legal requirements doubled again. In the first half of 2015 Microsoft rejected 4,383 requests, or 12 percent, for not meeting legal requirements. In the last half of 2014, Microsoft rejected 2,342 requests for not meeting legal requirements.

The goal of most cyber criminals is money. This report is about “conversion” – turning stolen data into cash. Card data is values between $5 and $30 depending on how complete it is. (Does this suggest a scenario for a “sting” operation? Also looks like my Ethical Hacking students could could create a database that looks like it contains real data. Not suggesting this as the best way to pay off those student loans!)
The Hidden Data Economy
by Sabrina I. Pacifici on Oct 17, 2015
The Marketplace for Stolen Digital Information – McAfee – This report was researched and written by: Charles McFarland, Fran├žois Paget, Raj Saman.
Raj Samani, CTO of Intel Security for Europe, the Middle East, and Africa: “Data is the “oil” of the digital economy. The commercial market for personal data is booming, with large databases of subscriber information driving up the enormous valuations of those companies that own it, even though many have yet to turn a profit. As the commercial value of personal data grows, cybercriminals have long since built an economy selling stolen data to anybody with a computer browser and the means to pay. In the 2013 McAfee Labs report Cybercrime Exposed: Cybercrime-as-a-Service, we demonstrated how current tools, products, and services can allow anyone to become a cybercriminal, regardless of technical ability. We followed up with the report Digital Laundry: An analysis of online currencies, and their use in cybercrime, which explained virtual currencies in detail and how they are used to convert stolen data into cash. By the time Digital Laundry was published in 2013, the publicity following the law enforcement action against the Silk Road let the world know that illegal products could easily be acquired online. Such actions have demonstrated just how much traditional crime has evolved with the help of the cyber world. Cybercrime Exposed and Digital Laundry focused on tools that aid an attack. This report will attempt to answer the question: What happens after a successful breach? Immediately after the Target breach, I cowrote a blog that tracked the sale of stolen credit cards and showed that much like traditional economics, the price of stolen credit cards went down with the huge influx of new stolen cards on the market. The Target example is only the tip of the iceberg. This paper provides more detail on this hidden data economy.”

I'm thinking we should enlarge the slides on and hang them in the computer labs...
The World's Highest-Paid YouTube Stars 2015
Forbes has released its first-ever ranking of the top-earning YouTube stars, and Swedish video-gamer PewDiePie notched the top spot on the list.
[One I find interesting:
4. Lindsey Stirling: $6 million
She plays the violin. She dances. Then she does them at the same time, and it’s kind of amazing. Stirling began posting her videos of herself performing in 2007 after failing to be signed by a major record label. Now they are begging to sign her, but too late—she doesn’t need them anymore. Explains Stirling: “It’s a very loyal fan base that wants you to succeed because they found you. It wasn’t some big radio station or record label that shoved art down someone’s throat.”

Survey Finds Teens Prefer Instagram, Twitter, Snapchat for Social Networks
A new survey may reignite the debate over teenagers’ use of Facebook.
In a Piper Jaffray semiannual survey of American teens, one-third described the photo-sharing app Instagram as their most important social network. Twitter finished second, named most important by 20% of respondents, followed closely by ephemeral chat app Snapchat with 19%.
Trailing all three was Facebook Inc.’s main app. Only 15% of teens in the survey said Facebook topped the list.
The results are not all bad news for Facebook – the company bought Instagram in 2012.
… Other reports offer a different view. In a survey released this spring, Pew Research Internet Project found Facebook the site used most frequently by U.S. teens between 13 and 17. The Pew report showed 41% of those polled described Facebook as the site they use most frequently, followed by Instagram with 20% and Snapchat at 11%.

No comments: