Seems to suggest law enforcement does not know how
to get the data they want.
Microsoft
Launches New Transparency Website
Microsoft
this week announced the launch of a new transparency website aimed at
offering access to various transparency reports published by the
company.
The
new Microsoft
Transparency Hub includes a report offering information on
requests that the tech giant receives from different parties seeking
the removal of online content. The website also provides users with
access to the Law
Enforcement Requests Report and
U.S. National Security Orders Report,
which cover the first six months of this year.
The
reports offer details on requests received for customer data in the
aforementioned period, showing a slight increase when compared to the
last six months of 2014. However, orders from the United States
Foreign Intelligence Surveillance Court are not included in the
report, as they are subject to a six-month reporting delay.
The
company revealed
that law enforcement agencies made 35,228 requests for customer
information during the first six months of the year, and that 72.7
percent of them came from organizations in five countries, namely
United States, United Kingdom, Turkey, France and Germany. However,
the Redmond-based giant notes that only
3 percent of the requests resulted in disclosed content.
… Last
month, Yahoo! revealed
that it had received 15,583 requests for user data in the first half
of 2015, while Amazon in June confirmed
1,000 requests for the first five months of the year.
[From
the web page:
Microsoft
does not disclose customer content without a court order or warrant.
The total number of requests rejected for not
meeting legal requirements doubled again. In the first half of 2015
Microsoft rejected 4,383 requests, or 12 percent, for not meeting
legal requirements. In the last half of 2014, Microsoft rejected
2,342 requests for not meeting legal requirements.
The goal of most cyber criminals is money. This
report is about “conversion” – turning stolen data into cash.
Card data is values between $5 and $30 depending on how complete it
is. (Does this suggest a scenario for a “sting” operation? Also
looks like my Ethical Hacking students could could create a database
that looks like it contains real data. Not suggesting this as
the best way to pay off those student loans!)
The Hidden
Data Economy
by Sabrina
I. Pacifici on Oct 17, 2015
The
Marketplace for Stolen Digital Information – McAfee – This
report was researched and written by: Charles McFarland, François
Paget, Raj Saman.
Raj Samani, CTO of Intel Security for Europe, the
Middle East, and Africa: “Data
is the “oil” of the digital economy. The commercial
market for personal data is booming, with large databases of
subscriber information driving up the enormous valuations of those
companies that own it, even though many have yet to turn a profit.
As the commercial value of personal data grows, cybercriminals have
long since built an economy selling stolen data to anybody with a
computer browser and the means to pay. In the 2013 McAfee Labs
report Cybercrime Exposed:
Cybercrime-as-a-Service, we demonstrated how current
tools, products, and services can allow anyone to become a
cybercriminal, regardless of technical ability. We followed up with
the report Digital Laundry: An analysis of online currencies, and
their use in cybercrime, which explained virtual currencies in detail
and how they are used to convert stolen data into cash. By the time
Digital Laundry was published in 2013, the publicity following the
law enforcement action against the Silk Road let the world know that
illegal products could easily be acquired online. Such actions have
demonstrated just how much traditional crime has evolved with the
help of the cyber world. Cybercrime Exposed and Digital Laundry
focused on tools that aid an attack. This
report will attempt to answer the question: What happens after a
successful breach? Immediately after the Target breach, I
cowrote a blog that tracked the sale of stolen credit cards and
showed that much like traditional economics, the price of stolen
credit cards went down with the huge influx of new stolen cards on
the market. The Target example is only the tip of the iceberg. This
paper provides more detail on this hidden data economy.”
I'm thinking we should enlarge the slides on
Forbes.com and hang them in the computer labs...
The World's
Highest-Paid YouTube Stars 2015
Forbes
has released its first-ever ranking of the top-earning YouTube
stars, and Swedish video-gamer PewDiePie notched the top spot on the
list.
[One I
find interesting:
4.
Lindsey Stirling: $6 million
She plays the violin.
She dances. Then she does them at the same time, and it’s kind of
amazing. Stirling began posting her videos of herself performing in
2007 after failing to be signed by a major record label. Now
they are begging to sign her, but too late—she doesn’t need them
anymore. Explains Stirling: “It’s
a very loyal fan base that wants you to succeed because they found
you. It wasn’t some big radio station or record label
that shoved art down someone’s throat.”
Perspective
Survey
Finds Teens Prefer Instagram, Twitter, Snapchat for Social Networks
A new survey may reignite the debate over
teenagers’ use of Facebook.
In a Piper Jaffray semiannual survey of American
teens, one-third described the photo-sharing app Instagram as their
most important social network. Twitter finished second, named most
important by 20% of respondents, followed closely by ephemeral chat
app Snapchat with 19%.
Trailing all three was Facebook Inc.’s main app.
Only 15% of teens in the survey said Facebook topped the list.
The results are not all bad news for Facebook –
the company bought Instagram in 2012.
… Other reports offer a different view. In a
survey released this spring, Pew Research Internet Project found
Facebook the site used most frequently by U.S. teens between 13 and
17. The Pew report showed 41% of those polled described Facebook as
the site they use most frequently, followed by Instagram with 20% and
Snapchat at 11%.
No comments:
Post a Comment