#50 – BLACKMAIL & BOUNTIES & BITCOIN – OH MY! – Dr. Carolyn Turbyfill

Do you have an old Hotmail account lying around?   What would you do if:

Dr. Carolyn Turbyfill

Dr. Carolyn Turbyfill

  • Someone took control of an account belonging to you – using public information to answer the security questions that allow you to reset a password.
  • Used your compromised account to break into other more sensitive accounts – your business, bank, etc.
  • Then blackmailed you for $20,000 with the threat of selling your identity and accounts to ‘fraudsters’ who ‘would ruin your life’? Continue reading

#16 – BIG DATA & PRIVACY (NOT) –CAROLYN TURBYFILL

Dr. Carolyn Turbyfill

The Internet, Big Data and Loss of Privacy

In my perpetual quest to make Cyber Security more accessible and less ponderous, I am experimenting with a new approach – a video parody of a Bond villain exposition, summarizing his nefarious plan:  Small Version: http://youtu.be/gi9sIHF2XBs Continue reading

IEEE ComputerWise- Two US Appeal Court Opinions Throw Software-related-theft Laws a Curve

From http://newsmanager.commpartners.com/ieeecw/issues/2012-05-02-email.html:

IEEE ComputerWise
Software, Systems and IT: News and Analysis May 2, 2012

Two US Appeal Court Opinions Throw Software-related-theft Laws a Curve

by Robert N. Charette
The U.S. Congress may have to revamp laws that ostensibly set the rules regarding what constitutes illegal activity when it comes to information technology. The U.S. Court of Appeals for the Ninth Circuit overturned the conviction of someone charged with stealing proprietary data from a former employer, reasoning that the wording of the law that prosecutors said he violated points specifically to hacking into computer systems and not the misappropriation of information residing there by an otherwise authorized user. A day later, a separate appeals court overturned the conviction of another defendant whose lawyers successfully appealed his conviction for violating that same law and two others—again arguing that the facts of the case didn’t fit the wording of the criminal statutes.

IEEE ComputerWise- Two US Appeal Court Opinions Throw Software-related-theft Laws a Curve

From http://newsmanager.commpartners.com/ieeecw/issues/2012-05-02-email.html:

IEEE ComputerWise
Software, Systems and IT: News and Analysis May 2, 2012

Two US Appeal Court Opinions Throw Software-related-theft Laws a Curve

by Robert N. Charette
The U.S. Congress may have to revamp laws that ostensibly set the rules regarding what constitutes illegal activity when it comes to information technology. The U.S. Court of Appeals for the Ninth Circuit overturned the conviction of someone charged with stealing proprietary data from a former employer, reasoning that the wording of the law that prosecutors said he violated points specifically to hacking into computer systems and not the misappropriation of information residing there by an otherwise authorized user. A day later, a separate appeals court overturned the conviction of another defendant whose lawyers successfully appealed his conviction for violating that same law and two others—again arguing that the facts of the case didn’t fit the wording of the criminal statutes.

#4 – QUANTIFYING CYBER ATTACKS AND CYBER WARFARE – (C) CAPERS JONES – TECHNOLOGY@RISK

The advent of the computer era has brought with it several new kinds of criminal activities and also new forms of military engagements that take place over long distances and involve either disabling military equipment or stealing secret information, or both.

There are also new laws against computer crimes including the United States Computer Fraud and Abuse Act from 1986 and the United Kingdom’s Computer Misuse Act.  There are also several laws against spyware.  However as in other fields laws do not prevent computer crimes.  Also, some computer malware such as browser hijackers and spyware may be legal if they are identified in license agreements that users accept.

Continue reading