Cybersecurity

ABA Cybersecurity for Lawyers Handbook


By Paul Rosenzweig Tuesday, November 7, 2017, 6:07 AM The American Bar Association has released the second edition of it’s handbook for professionals.  Entitled (rather unimaginatively :-)), “The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals, Second Edition,” the book is a compendium of information that “will enable lawyers and law firms to… Continue reading ABA Cybersecurity for Lawyers Handbook

Information operations · Cybersecurity · cyberwar · Information Warfare

US Congress mulls first ‘hack back’ revenge law. And yup, you can guess what it’ll let people do


Can you say ‘collateral damage’? By Iain Thomson in San Francisco 13 Oct 2017 at 22:36 Two members of the US House of Representatives today introduced a law bill that would allow hacking victims to seek revenge and hack the hackers who hacked them. The Active Cyber Defense Certainty Act (ACDC) [PDF] amends the Computer… Continue reading US Congress mulls first ‘hack back’ revenge law. And yup, you can guess what it’ll let people do

Cybersecurity · Information operations · Information Warfare

Equifax takes down web page after report of new hack


Equifax is in real trouble.  …an independent security analyst on Wednesday found part of Equifax’s website was under the control of attackers trying to trick visitors into installing fraudulent Adobe Flash updates that could infect computers with malware. </end editorial> John McCrank NEW YORK (Reuters) – Equifax Inc said on Thursday it has taken one of its customer help… Continue reading Equifax takes down web page after report of new hack

Cybersecurity · cyberwar · Information operations · Information Warfare

Cyber Command stands up planning cells at combatant commands


By: Mark Pomerleau Cyber Command has stood up forward-deployed planning cells within the combatant command staffs to help better coordinate offensive and defensive cyber effects. The entities, called Cyber Operations-Integrated Planning Elements, or CO-IPE, are weeks-old. They will do all the planning for Department of Defense Information Network operations, defensive cyber operations, internal defensive measures and… Continue reading Cyber Command stands up planning cells at combatant commands

Cybersecurity · cyberwar

State Plans To Elevate Cyber Mission, Despite Shuttering Dedicated Office


Secretary of State Rex Tillerson’s decision to oust the State Department’s cyber coordinator and a plan to downgrade and absorb the coordinator’s office into the agency’s economic section are just the first moves in a process that will end with cyber diplomacy gaining rather than losing prominence, a top State official told lawmakers Tuesday. That… Continue reading State Plans To Elevate Cyber Mission, Despite Shuttering Dedicated Office

Cybersecurity

My Comments on the breach at [$COMPANY_NAME$]


Sheer genius. I wish I could take credit, but alas, I cannot. </end editorial> I heard about the breach at [$COMPANY_NAME$] and the [$BREACH_QUANTITY$] [$DATA_TYPE$ one of “credit card”, “patient record”, “social security number”, “user login”, “hashed passwords”, “national security secrets”, “Hollywood star’s ‘selfies’”] compromised. Of course this is a serious matter and is the… Continue reading My Comments on the breach at [$COMPANY_NAME$]

Information operations · Information Warfare

Was The Merchant Ship Hacked? McCain Collision Is First Run For Navy Cyber Investigators


A cyber investigation is now a part of every incident investigation in the US Navy now. Nobody thinks the ship was hacked, but nevertheless, the possibility must be explored. </end editorial> By SYDNEY J. FREEDBERG JR.on September 14, 2017 at 12:56 PM WASHINGTON: The Navy is making cyber investigations automatic after any mishap, starting with the at-sea… Continue reading Was The Merchant Ship Hacked? McCain Collision Is First Run For Navy Cyber Investigators