How big a straw is this on the “Let's
not go to war again” camel?
"Government institutions are
among the targets of an attack
on Pakistani bodies, which originates in India, according to
reports. The campaign is using vulnerabilities in Microsoft software
to install the HangOver malware, according
to Norwegian security firm Norman Shark (PDF). From the article:
'In the attacks
on Pakistani organizations, spear phishing emails were sent out
purporting to contain information on "ongoing conflicts in the
region, regional culture and religious matters," according to
Norman.
Norman could not provide direct
attribution to the attacks, but its report did note the following:
"The continued targeting of Pakistani interests and origins
suggested that the attacker was of Indian origin." Snorre
Fagerland, principal security researcher in the Malware Detection
Team at Norman, told TechWeekEurope it appeared Pakistani government
bodies had been attacked.'"
Why would this information be online?
I can see a need for parts of the subpoenas you are currently working
on, but why keep all of them online?
Ellen Nakashima reports:
Chinese hackers
who breached Google’s servers several years ago gained
access to a sensitive database with years’ worth of information
about U.S. surveillance targets, according to current and
former government officials.
The breach appears
to have been aimed at unearthing the identities of Chinese
intelligence operatives in the United States who may have been under
surveillance by American law enforcement agencies.
Read more on Washington
Post.
[From the article:
The database included information about
court orders authorizing surveillance — orders that could have
signaled active espionage investigations into Chinese agents who
maintained e-mail accounts through Google’s Gmail service.
When the “government before citizens”
folks are in charge, “wrongs overrule rights.”
Feds
Tracked Reporter’s Movements, Personal E-Mail in Criminal
Conspiracy Investigation
In an effort to unmask a leaker who fed
a reporter classified information about North Korea, FBI
investigators tracked the journalist’s movements in and out of a
government building, obtained copies of e-mails from his personal
account and also took the unprecedented step of alleging that the
reporter engaged in a criminal conspiracy simply for doing his job.
Investigators tracked the reporter’s
movement using security badge access records as he left and returned
to the State Department’s headquarters in Washington, DC, and also
obtained two days’ worth of e-mail correspondence from his Gmail
account.
The FBI took the aggressive steps in
2009 against Fox
News reporter James Rosen, the news outlet’s chief Washington,
DC correspondent, over a story Rosen published online in June that
year, according to the Washington Post.
“Never in the history
of the Espionage Act has the government accused a reporter of
violating the law for urging a source to disclose information,”
Ben Wizner, director of the ACLU’s Speech, Privacy and Technology
Project said in a statement. “This is a dangerous
precedent that threatens to criminalize routine investigative
journalism.”
… According to the
affidavit (.pdf), FBI Agent Reginald Reyes told the judge there
was probable cause to believe that Rosen had violated the Espionage
Act by serving “as an aider, abettor and/or co-conspirator” in
the leak. The federal judge found there was probable cause to
believe that Rosen was a co-conspirator and approved the warrant.
(Related)
May 20, 2013
DOJ
IG Report of Investigation Concerning the Improper Disclosure of DOJ
Information to a Member of the Media
U.S. Department of Justice Office of
the Inspector General Report
of Investigation Concerning the Improper Disclosure of U.S.
Department of Justice Information to a Member of the Media, May
2013
- "...In Section II of this report, we provide background information about the Dodson memorandum and the Department policies that govern the disclosure of information to the media by Department officials, including U.S. Attorneys. Section III describes our factual findings concerning the disclosure of the Dodson memorandum. We also include in this section a description of relevant information the Department learned during its review of another disclosure to the media in the summer of 2011 of confidential Department information relating to Operation Fast and Furious. Section IV sets forth our analysis and conclusions."
The ayes have it! (But is the language
too restrictive?)
California continues to lead the way in
protecting consumers whose data have been breached. By a vote of
37-0-1 last week, the Senate passed S.B. 46, a bill introduced by
Senator Ellen Corbett.
The bill amends existing law to expand
required notification to situations involving access to an online
account. The law would still incorporate an acquisition standard as
a trigger for notification, but the definition of personal
information is amended to replace “username, password” with “(2)
A user name or email address, in combination with a password or
security question and answer that would permit access to an online
account.”
The bill
now moves to the House.
Must have missed this. I wonder if it
is still downloadable at their website? (Yes, they are!)
By Dissent,
May 20, 2013 1:48 pm Via PPR:
Tonight “The
Willis Report” starts an investigative series titled “Medical
Privacy Week.” The opening night will feature Patient Privacy
Rights’ Founder, Dr. Deborah Peel, and Marc Rotenberg, Executive
Director of the Electronic Privacy Information Center. Tomorrow the
show features Pam Dixon with the World Privacy Forum. This is
the first series on national TV news to examine Americans’ lack of
control over their sensitive electronic health information, from
prescription records to DNA to diagnoses.
Date: Monday, May 20, 2013 Time:
6:00pm ET / 5:00pm CT
Please check your local listings or use
the Fox
Business Channel Finder
(Related)
The current (May) issue of Harvard
Law Review has papers from a Privacy and Technology Symposium.
You can download the full papers from the links
below:
SYMPOSIUM
PRIVACY AND TECHNOLOGY
Introduction: Privacy Self-Management and the Consent Dilemmas Daniel J. Solove
Introduction: Privacy Self-Management and the Consent Dilemmas Daniel J. Solove
What
Privacy is For Julie E. Cohen
The
Dangers of Surveillance Neil M. Richards
The
EU-U.S. Privacy Collision: A Turn to Institutions and Procedures
Paul M. Schwartz
Toward
a Positive Theory of Privacy Law Lior Jacob Strahilevitz
Bad lawyers! Bad, bad lawyers!
rudy_wayne writes with news that the
Prenda lawyers recently
sanctioned by a federal judge are starting to face consequences.
From the article:
"On
Friday, Paul Hansmeier, a Minnesota attorney who has been pointed to
as one of the masterminds of the Prenda copyright-trolling scheme,
filed
an emergency motion to stay the $81,000 sanctions order while he
and his colleagues could mount an appeal. Today the
appeals court flatly denied his motion. Two appellate judges
signed this order, and it gives Hansmeier the option to make a plea
for delay with the district court judge. That would be U.S. District
Judge Otis Wright, the judge who sanctioned Hansmeier in the first
place. Hansmeier is also getting
kicked off a case he was working on that was totally unrelated to
Prenda's scheme of making copyright accusations over alleged
pornography downloads. On Friday, the 9th
Circuit Commissioner ordered Hansmeier, in no uncertain terms, to
withdraw from a case involving Groupon since he has been referred to
the Minnesota State Bar for investigation. The commissioner has
delayed Hansmeier's admission to the 9th Circuit because of Wright's
order, which refers to Wright's finding of 'moral turpitude.'"
Told ya!
"Had Locked Down:
Information Security for Lawyers not been published by
the American Bar Association (ABA) and 2 of its 3 authors not been
attorneys; one
would have thought the book is a reproach against attorneys for their
obliviousness towards information security and privacy.
In numerous places, the book notes that lawyers are often clueless
when it comes to digital security. With that, the book is a
long-overdue and valuable information security reference for anyone,
not just lawyers."
… A pervasive aspect of the book is
ABA rule 1.6 regarding the confidentiality of information regarding
client-lawyer relationships.
For my Intro to IT students. A Swiss
Army Tool for tour Swiss Army folder on your thumb drive...
… Ubiquitous Player is a completely
portable
application that runs on any version of Windows from XP onward.
It’s 100% free and even works on tablet or touchscreen devices.
This application aims to serve every purpose of your daily PC
routine. It’s packed with a media player, image viewer, file
manager, text editor, browser, bookmark manager, notes keeper,
calculator, color picker, screenshot tool, clipboard monitor, and
even more.
Perspective for my Intro to IT
students. Infographic
… We currently create 5 billion
gigabytes worth of data every two days. By 2014 we will create that
every 10 minutes.
I was thinking of reprinting (in nice
leather with gold tipped pages) “The Care & Feeding of
Waterbuffalo” NOTE: It does look like they have some interesting
stuff on law, education, etc.
May 20, 2013
UNESCO
to make its publications available free of charge as part of a new
Open Access policy
New
Policy: "UNESCO will make its digital publications available
to millions of people around the world free-of-charge with an open
license. Following a decision by the Organization’s Executive
Board in April, UNESCO has become the first member of the United
Nations to adopt such an Open Access policy for its publications.
The new policy means that anyone will be able to download, translate,
adapt, distribute and re-share UNESCO publications and data without
paying."
[From the UNESCO
website:
Contains over 130 000 free
downloadable documents in six official languages covering all
UNESCO fields of competence since 1945 and publications edited by the
Organization.
Hey, why not... (I like
the first one: 'Advice for Liberal Arts majors')
Strategic
Humor: Cartoons from the June 2013 Issue
No comments:
Post a Comment