Tuesday, July 01, 2014

Interesting thought.
Susan Landau focuses on what the Supreme Court’s opinion in Riley didn’t discuss:
Riley has no discussion regarding expectation of privacy, the two-part test based on whether an individual has sought to keep certain information private and whether society views the individual’s expectation of privacy as reasonable. Expectation of privacy underlies decisions in such cases as United States v. Miller and Smith v. Maryland. In Riley, much of the information on the cell phone might have been held by third parties in the “cloud,” but the justices did not focus on that issue.
Read more on Lawfare Blog
[From the article:
In Riley, the court avoided relying on a social construct, expectation of privacy, that may be changing in ways that deeply disrupt society’s basic fabric. The justices’ reliance on search in deciding a warrant was needed provides important insight to their thinking. For privacy’s sake, one hopes this decision is a marker for future ones.


Perspective.
From the FTC:
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.
Read their annual report, which provides examples of different types of cases, on their site (pdf).


Are most police departments too small to have adequate resources? (Tech expertise and cooperation with other organizations spread all over the globe)
Why Do We Call It Cyber Crime If We Don’t Treat It Like a Crime?
… Earlier this year, Gary Warner gave a presentation at the TEDxBirmingham conference in which he challenged the conventional wisdom of cyber crime in America. Warner is a world-renowned researcher on cyber crime and has been recognized by the FBI for his exceptional service in the public interest.
If you can spare 14 minutes, you should watch Warner’s very entertaining but informative presentation here: http://www.youtube.com/watch?v=MPMr5jPwA7I

(Related) Some corporations see the fight against cybercrime as “good for business.” Do they have the resources and skill to do it right?
Microsoft Darkens 4MM Sites in Malware Fight
Millions of Web sites were shuttered Monday morning after Microsoft executed a legal sneak attack against a malware network thought to be responsible for more than 7.4 million infections of Windows PCs worldwide.
In its latest bid to harness the power of the U.S. legal system to combat malicious software and cybercrooks, Microsoft convinced a Nevada court to grant the software giant authority over nearly two dozen domains belonging to no-ip.com, a company that provides dynamic domain name services.
… Microsoft was supposed to filter out the traffic flowing to and from those 18,400+ hostnames, and allow the remaining, harmless traffic to flow through to its rightful destination. But according to no-ip.com marketing manager Natalie Gogun, that’s not at all what happened.
“They made comments that they’d only taken down bad hostnames and were supposedly redirecting all good traffic through to users, but it’s not happening, and they’re not able to handle our traffic volumes,” Gogun said. “Many legitimate users that use our services have been down all day.”
Gogun said while Microsoft claimed that there were more than 18,000 malicious hostnames involved, no-ip.com could only find a little more than 2,000 from that list that were still active as of Monday morning. Meanwhile, some four million hostnames remain offline, with customer support requests piling up.
“So, to go after 2,000 or so bad sites, [Microsoft] has taken down four million,” Gogun said.
… The complaint against no-ip, the accused malware authors, and the rest of Microsoft’s various legal filings in this case are available at this link.


Perspective. Just in case you didn't think we have the whole world under surveillance.
– is a world-wide, real-time, community based lightning detection and lightning location network with live lightning maps. By looking at the map of anywhere in the world, you can see where the lightning currently is. Just click on the desired continent and it will tell you how many strikes there have been, and in what time-frame.


Tools & Techniques. Just because...
How to Save Tweets for any Twitter Hashtag


Maybe there is hope for America.
Reading Rainbow Breaks Kickstarter Record
The crowdfunded effort to bring back Reading Rainbow has become the most popular Kickstarter campaign of all time. At the time of writing it has gained 95,496 backers, beating the 91,585 that backed the Veronica Mars movie.
The Reading Rainbow revival originally had a target of $1 million but has smashed through that to raise at least $4.7 million. Reading Rainbow exists to encourage kids to read, which is surely more important than any piece of nonsense hardware.


For my Computer Forensics students.
The 1s and 0s behind cyber warfare
… In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.

No comments: