What would have made this legal? Is there
anything illegal about re-publishing data that has been publicly
available for months? Isn’t that simply “data aggregation?”
Canadian
Man Charged Over Leak of Three Billion Hacked Accounts
An
Ontario man made his first court appearance Monday to answer charges
of running a website that collected personal and password data from
some three billion accounts, and sold them for profit.
Jordan
Evan Bloom, 27, of Thornhill earned some Can$247,000 ($198,800 US) by
selling the data for a "small fee" via leakedsource.com,
the Royal Canadian Mounted Police said in a statement.
The
information was stolen during massive hacks of websites including
LinkedIn
and the Ashley
Madison online dating service.
… Authorities
have shut down Bloom's website, but another with the same domain name
hosted by servers in Russia is still operating.
Something for my Computer Security students to
consider. Why I start so many descriptions of technology with the
phrase, “It’s like...”
Law,
Metaphor and the Encrypted Machine
Gill, Lex, Law, Metaphor and the Encrypted Machine
(2017). Available at SSRN: https://ssrn.com/abstract=2933269
– “The metaphors we use
to imagine, describe and regulate new technologies have profound
legal implications. This paper offers a critical
examination of the metaphors we choose to describe encryption
technology in particular, and aims to uncover some of the normative
and legal implications of those choices. Part
I provides a basic description of encryption as a mathematical and
technical process. At the heart of this paper is a
question about what encryption is to the law. It is therefore
fundamental that readers have a shared understanding of the basic
scientific concepts at stake. This technical description will then
serve to illustrate the host of legal and political problems arising
from encryption technology, the most important of which are addressed
in Part II. That section also provides a brief history of various
legislative and judicial responses to the encryption “problem,”
mapping out some of the major challenges still faced by jurists,
policymakers and activists. While this paper draws largely upon
common law sources from the United States and Canada, metaphor
provides a core form of cognitive scaffolding across legal
traditions. Part III explores the relationship between metaphor and
the law, demonstrating the ways in which it may shape, distort or
transform the structure of legal reasoning. Part IV demonstrates
that the function served by legal metaphor is particularly
determinative wherever the law seeks to integrate novel technologies
into old legal frameworks. Strong, ubiquitous commercial encryption
has created a range of legal problems for which the appropriate
metaphors remain unfixed. Part V establishes a loose framework for
thinking about how encryption has been described by courts and
lawmakers—and how it could be. What does it mean to describe the
encrypted machine as a locked container or building? As a
combination safe? As a form of speech? As an untranslatable library
or an unsolvable puzzle? What is captured by each of these cognitive
models, and what is lost? This section explores both the
technological accuracy and the legal implications of each choice.
Finally, the paper offers a few concluding thoughts about the utility
and risk of metaphor in the law, reaffirming the need for a critical,
transparent and lucid appreciation of language and the power it
wields.”
Possible insights from a war fighting strategy?
U.S. Army
Concept for Cyberspace and Electronic Warfare Operations 2025-2040
The
U.S. Army Concept for Cyberspace and Electronic Warfare Operations
2025-2040, CRS report via FAS. “TRADOC Pamphlet 525-8- 6, The
U.S. Army Concept for Cyberspace and Electronic Warfare Operations
expands on the ideas presented in TRADOC Pamphlet 525-3- 1, The U.S.
Army Operating Concept: Win in a Complex World (AOC). This document
describes how the Army will operate in and through cyberspace and the
electromagnetic spectrum and will fully integrate cyberspace,
electronic warfare (EW), and electromagnetic spectrum operations as
part of joint combined arms operations to meet future operational
environment challenges. Cyberspace and EW operations provide
commanders the ability to conduct simultaneous, linked maneuver in
and through multiple domains, and to engage adversaries and
populations where they live and operate. Cyberspace and EW
operations provide commanders a full range of physical and virtual,
as well as kinetic and non-kinetic, capabilities tailored into
combinations that enhance the combat power of maneuver elements
conducting joint combined operations. This concept serves as a
foundation for developing future cyberspace and electronic warfare
capabilities and helps Army leaders think clearly about future armed
conflict, learn about the future through the Army’s campaign of
learning, analyze future capability gaps and identify opportunities,
and implement interim solutions to improve current and future force
combat effectiveness..”
(Related)
Trust War:
Dangerous Trends in Cyber Conflict
Perspective. Big Data requires big
infrastructure.
Cloud
computing: Now Google adds more data centers, plans its own undersea
cable
… The advertising-to-cloud-computing giant
said its new Netherlands
and Montreal cloud computing regions will open in the first
quarter of 2018, followed by Los Angeles, Finland, and Hong Kong.
Like other cloud infrastructure companies, Google
orders its cloud computing resources into regions which are then
subdivided into zones, which include one
or more data centers from which customers can run their
services. It currently has 15 regions made up of 44 zones.
… It's the second announcement of big cloud
computing infrastructure spending of the day: Google's big rival
Amazon Web Services has already announced it has opened its 50th data
center availability
zone, in London. AWS has plans for 12 more AZs and four more
regions.
Student toolkit.
Search your
Handwritten Notes with Gmail OCR
One of the most useful features of Evernote and
OneNote is Image OCR. When you clip an image – be it a screenshot,
a scanned business card, or a picture of the whiteboard – these
tools automatically detect the text inside the image and make the
image searchable.
Gmail
text search has always been very capable but some might not know
that Gmail, like Evernote, also performs OCR on images contained in
email messages. When you perform searches inside Gmail or Google
Inbox, the results always contain matching images that contain the
search keywords.
… Text recognition in Gmail works for both
image attachments as well as inline embedded images.
… Google
Drive and Google Keep are other Google products that offer you
the ability to search for text within stored images. In the case of
Google Keep, you also have the option to extract the text detected
inside in an image and store it within the note itself.
(Ditto)
No comments:
Post a Comment