Thursday, August 11, 2016

My Computer Security students should memorize this. 
Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts
Deloitte identifies 14 business impacts of a Cyberattack...
   “Beneath the surface of a cyberattack” was created by Deloitte Advisory’s Cyber Risk practice in tandem with the organization’s leading forensic and investigations, and business valuation services.  Looking at two samples cyberattack scenarios, the report demonstrates a model to quantify potential damage, and identifies 14 business impacts of a cyber incident as they play out over a five-year incident response process.  The scenarios illustrate some of the many ways a cyberattack can unfold and both clearly illustrate that the road to business recovery can be far more drawn out, more complex, and more costly than imagined.
Above the surface: well-known cyber incident costs
  • Customer breach notifications
  • Post-breach customer protection
  • Regulatory compliance (fines)
  • Public relations/crisis communications
  • Attorney fees and litigation
  • Cybersecurity improvements
  • Technical investigations
Below the surface: hidden or less visible costs
  • Insurance premium increases
  • Increased cost to raise debt
  • Operational disruption or destruction
  • Lost value of customer relationships
  • Value of lost contract revenue
  • Devaluation of trade name
  • Loss of intellectual property (IP)

This assumes that criminals will cooperate? 
Thailand to make tourists use traceable SIM cards
Foreign tourists in Thailand will be required to use a special SIM card for their mobile phones that could be used to track their movements during their stay, the telecom regulator said on Tuesday.
This SIM card has been specially programmed to transmit information about its whereabouts once it is inserted in the phone.  This function cannot be turned off when the SIM is in use.
All foreigners in Thailand, excluding expats with permanent addresses, will be required to purchase the special card, Thakorn Tantasith, secretary general of the National Broadcasting and Telecommunication Commission said.
"It will benefit the government authority by being able to trace the location of tourists who have illegally extended their stays or criminals who have fled to Thailand to escape," he said.  It will also be easier to track tourists who stay in multiple locations during their stay, he added.
But in order to obtain the tourists' locations, police and any authority will need a court order.  If a telecom operator reveals information without a court order, its officials will be penalized with a five-year jail term.  "If the tourist has not done anything wrong, there's nothing to worry about to begin with," Thakorn said.

How brotherly, how Big, Big Brotherly.
Joe Cadillic writes:
DHS’s Hometown Security Initiative (HSI) encourages businesses to spy on Americans.  DHS admits to working closely with the private sector.
HSI’s four parts ConnectPlanTrain, and Report are designed to encourage spying on Americans.
I’ll let you read the rest on Joe’s newly redesigned blog, but want to highlight something he wrote:
Businesses and landlords are doing there part to keep Americans in fear. DHS and the FBI survive on fear, their budgets depend on Americans being suspicious of everyone and everything.  Where does the lunacy end?

(Related) Are Apps like this useful without violating privacy?
You Can Help Fight Human Trafficking With This App
While much of it may be dedicated to cat videos and trolling, there is no doubting the internet’s positive and collective power.  TraffickCam takes all of these elements and puts it toward an important cause: using the power of crowdsourcing to fight human trafficking.
So how does it work?  Accessible on the go with iOS and Android apps or through its website, TraffickCam is calling on travelers to upload photos of your hotel rooms.  Whenever you travel, by taking up to four photos of the room you’re staying in, you are contributing to a database that will help in the prosecution of human traffickers.

Interesting.  Still not the same as the Kim Dotcom case.
Last December a Virginia federal jury ruled that Internet provider Cox Communications was responsible for the copyright infringements of its subscribers.
The ISP was found guilty of willful contributory copyright infringement and ordered to pay music publisher BMG Rights Management $25 million in damages.
The verdict was a massive victory for the music licensing company and nothing short of a disaster for Cox.
   In the verdict, the court upholds the conclusions of the jury.  Among other things, it rules that there is sufficient evidence for a jury to conclude that Cox is responsible for the infringements that occurred on its network.
The fact that the ISP chose not to forward BMG’s notices and settlement requests to its customers to protect them from extortion-like practices, doesn’t change this.
“Whether or not Cox’s effort to protect its customers from Rightscorp was noble or well-intentioned, Cox could not also turn a blind eye to specific infringement occurring on its network,” Judge O’Grady writes.

For my Data Management students.  Deliberate rounding error and failure to report “unknown” location?
Kansas couple sues IP mapping firm for turning their life into a “digital hell”
   As any geography nerd knows, the precise center of the United States is in northern Kansas, near the Nebraska border.  Technically, the latitudinal and longitudinal coordinates of the center spot are 39°50′N 98°35′W.  In digital maps, that number is an ugly one: 39.8333333,-98.585522.  So back in 2002, when MaxMind was first choosing the default point on its digital map for the center of the U.S., it decided to clean up the measurements and go with a simpler, nearby latitude and longitude: 38°N 97°W or 38.0000,-97.0000.
As a result, for the last 14 years, every time MaxMind’s database has been queried about the location of an IP address in the United States it can’t identify, it has spit out the default location of a spot two hours away from the geographic center of the country.

Perspective.  Yet another company that finds mobile used more than desktops.
Alibaba posts record growth as mobile revenue tops desktop for first time

Certainly novel.
Online used-car startup Carvana gets $160 million in new funding
Online used-car startup Carvana, known for delivering vehicles through vending machines, said today it closed a $160 million funding round that brought the total raised to nearly half a billion dollars.
   The company operates automated towers holding several cars.  A customer can buy a car online and can either pick it up from the vending machine or have it delivered.
At the machine, customers are required to enter their details on a tablet, after which they get a coin.  When the coin is inserted into the machine the ordered car is automatically delivered from the machine.

Perhaps a project for the Electrical Engineering class?  Few details.  Watch the video. 
This Startup Wants to Build a Drone-Proof Fence to Protect Your Property
   Linda Ziemba is the founder of Drone Go Home, a drone intrusion prevention system that offers mobile and permanent installations

If you send a message to a politician, do you expect them to re-lie?
Got something to tell the president? Try the White House's new Facebook bot

There are lots of ways to vary (twist) a business model.  A friend recently attended a seminar on “How to get around Denver” that talked about light rail, busses, Uber, and this one:
Driving Miss Daisy, Inc.

(Related) I found this one while searching for DMD.
An assistant for folks that don't like smartphones.

No comments: