Interesting thought.
Susan
Landau focuses on what the Supreme Court’s opinion in Riley didn’t
discuss:
Riley has no discussion regarding expectation
of privacy, the two-part test based on whether an individual has
sought to keep certain information private and whether society views
the individual’s expectation of privacy as reasonable. Expectation
of privacy underlies decisions in such cases as United
States v. Miller and Smith
v. Maryland. In Riley,
much of the information on the cell phone might have been held by
third parties in the “cloud,” but the justices did not focus on
that issue.
Read
more on Lawfare
Blog
[From
the article:
In
Riley, the court avoided relying on a social construct, expectation
of privacy, that may be changing in ways that deeply disrupt
society’s basic fabric. The
justices’ reliance on search in deciding a warrant was needed
provides important insight to their thinking. For
privacy’s sake, one hopes this decision is a marker for future
ones.
Perspective.
From
the FTC:
The Federal Trade Commission (FTC or Commission) is an independent
U.S. law enforcement agency charged with protecting consumers and
enhancing competition across broad sectors of the economy. The FTC’s
primary legal authority comes from the Federal Trade Commission Act,
which prohibits unfair or deceptive practices in the marketplace.
The FTC also has authority to enforce a variety of sector specific
laws, including the Truth in Lending Act, the CAN-SPAM Act, the
Children’s Online Privacy Protection Act, the Equal Credit
Opportunity Act, the Fair Credit Reporting Act, the Fair Debt
Collection Practices Act, and the Telemarketing and Consumer Fraud
and Abuse Prevention Act. This broad authority allows the Commission
to address a wide array of practices affecting consumers, including
those that emerge with the development of new technologies and
business models.
Read
their annual report, which provides examples of different types of
cases, on their
site (pdf).
Are
most police departments too small to have adequate resources? (Tech
expertise and cooperation with other organizations spread all over
the globe)
Why
Do We Call It Cyber Crime If We Don’t Treat It Like a Crime?
…
Earlier this year, Gary Warner gave a presentation at the
TEDxBirmingham conference in which he challenged the conventional
wisdom of cyber crime in America. Warner is a world-renowned
researcher on cyber crime and has been recognized by the FBI for his
exceptional service in the public interest.
If
you can spare 14 minutes, you should watch Warner’s very
entertaining but informative presentation here:
http://www.youtube.com/watch?v=MPMr5jPwA7I
(Related)
Some corporations see the fight against cybercrime as “good for
business.” Do they have the resources and skill to do it right?
Microsoft
Darkens 4MM Sites in Malware Fight
Millions
of Web sites were shuttered Monday morning after Microsoft executed a
legal sneak attack against a malware network thought to be
responsible for more than 7.4 million infections of Windows PCs
worldwide.
In
its latest bid to harness the power of the U.S. legal system to
combat malicious software and cybercrooks, Microsoft convinced a
Nevada court to grant the software giant authority over nearly two
dozen domains belonging to no-ip.com,
a company that provides dynamic domain name services.
…
Microsoft was supposed to filter out the traffic flowing to and from
those 18,400+ hostnames, and allow the remaining, harmless traffic to
flow through to its rightful destination. But according to no-ip.com
marketing manager Natalie Gogun, that’s not at all what happened.
“They
made comments that they’d only taken down bad hostnames and were
supposedly redirecting all good traffic through to users, but it’s
not happening, and they’re
not able to handle our traffic volumes,” Gogun said.
“Many legitimate users that use our services have been down all
day.”
Gogun
said while Microsoft claimed that there were more than 18,000
malicious hostnames involved, no-ip.com could only find a little more
than 2,000 from that list that were still active as of Monday
morning. Meanwhile, some four million hostnames remain offline, with
customer support requests piling up.
“So,
to go after 2,000 or so bad sites, [Microsoft] has taken down four
million,” Gogun said.
…
The complaint against no-ip, the accused malware authors, and the
rest of Microsoft’s various legal filings in this case are
available at this
link.
Perspective.
Just in case you didn't think we have the whole world under
surveillance.
–
is a world-wide, real-time, community based lightning detection and
lightning location network with live
lightning maps. By looking at the map of anywhere
in the world, you can see where the lightning currently
is. Just click on the desired continent and it will tell you how
many strikes there have been, and in what time-frame.
Tools
& Techniques. Just because...
How
to Save Tweets for any Twitter Hashtag
Maybe
there is hope for America.
Reading
Rainbow Breaks Kickstarter Record
The
crowdfunded effort to bring back Reading Rainbow has become the most
popular Kickstarter campaign of all time. At the time of writing
it has gained 95,496 backers, beating the 91,585 that backed the
Veronica Mars movie.
The
Reading
Rainbow revival originally had a target of $1 million but has
smashed through that to raise at least $4.7 million. Reading Rainbow
exists to encourage kids to read, which is surely more important than
any piece of nonsense hardware.
For
my Computer Forensics students.
The
1s and 0s behind cyber warfare
…
In this engaging talk, he shows how researchers use pattern
recognition and reverse engineering (and pull a few all-nighters) to
understand a chunk of binary code whose purpose and contents they
don't know.
No comments:
Post a Comment