I haven't seen anything to suggest that
Snowden was involved in policy decisions or strategic decisions, so
why would he have access to “everything NSA does?” Sounds more
like a sales pitch than reality.
U.S.
worried about security of files Snowden is thought to have
The ability of
contractor-turned-fugitive Edward Snowden to evade arrest is raising
new concerns among U.S. officials about the security of top-secret
documents he is believed to have in his possession — and about the
possibility that he could willingly share them with those who assist
his escape.
… The NSA has teams of analysts
scouring systems that they think Snowden may have accessed, officials
said. Analysts are seeking to retrace his steps
online and to assemble a catalogue of the material he may have taken.
[I find that difficult to believe. It suggests that no one has
control of Top Secret materials. Bob]
“They think he copied so much stuff —
that almost everything that place does, he has,” said one former
government official, referring to the NSA, where Snowden worked as a
contractor for Booz Allen Hamilton while in the NSA’s Hawaii
facility.
Perhaps they have another law that they
interpret as allowing them to lie to mere citizens or to Congress
unless in closed sessions?
Today, Senators Wyden and Udall wrote
to General Alexander requesting corrections in a recent NSA fact
sheet on surveillance authorities.
“In our
judgement this inaccuracy is significant, as it portrays protections
for Americans’ privacy being significantly stronger than they
actually are,” wrote Wyden and Udall.
The Senators could not state exactly
what those inaccuracies are because it relates to classified
information, but they appended specifics in a classified attachment.
Sort of a summary. I haven't seen
anyone specalizing in this area, but it should merit at least a class
in law schools by now.
While the Internet has already provided
for ways
to remove your deceased loved one’s digital accounts, there is
occasionally the need to access them. Sometimes it’s for will
information – other times it has to deal with financial reasons.
… Below are a few tips to get you
started in the right direction for gaining access to your deceased
relative’s digital account. I can’t guarantee success,
but I can say that these are good ways to move forward.
Security is making its way into the
Boardroom...
The
Escalating Cost of Software Malice
Malicious attacks by hackers: At first
they were an irritating oddity, but they've surged so much over the
past few years that now they're the most common cause of data
breaches among U.S. companies. Because these incidents are hard to
discover and combat, they're also now the most costly form of loss.
As part of HBR's "Data
Under Siege" Insight Center, we present a
few charts that show just how quickly malicious attacks,
and their costs, are mounting. The most recent data comes from a
2013 study by the Ponemon Institute and Symantec of 277 companies
that experienced losses or thefts of protected personal data.
(Related) We just graduated a few I
can recommand...
Cyber
Security Depends on Education
We're facing an eyebrow-raising talent
shortfall in cyber security. Consider the findings of a recent
inquiry by the UK's National Audit Office. Its
report stressed not only that the current pool of
security-educated graduates and practitioners falls far short of
demand, but also that "it could take up to 20 years to address
the skills gap."
(See our recent report here:
Cybersecurity
Education for the Next Generation.)
Is this what my students do, rather
than homework?
Hey, it can't hurt!
The Federal
Registry for Educational Excellence (FREE) has partnered with the
Learning Registry to
provide educators, parents, and students in the U.S. with more than
200,000 freely available resources online.
No comments:
Post a Comment