Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]
July 11, 2013 by Nick Selby
If you’re not familiar with DefCon, the hacker confab that has been meeting in Vegas for more than 20 years, you’re not paying attention to hacking. DefCon (and the accompanying conferences like BlackHat and BSides) makes Vegas the nerdiest place in the universe during July. You don’t want to use an ATM, connect to a […]
June 18, 2013 by Nick Selby
Today’s guest post is from Eric Olson, author of the Digital Water blog and a previous contributor to PLI. Well, I haven’t had much time to write here for quite a while, but the Edward Snowden affair – and more specifically this piece in the Guardian – were such a terrific display of the Digital […]
May 23, 2013 by Nick Selby
A bipartisan group that studies the effects and impacts of IP theft in the US, The Commission on the Theft of American Intellectual Property, has released a report outlining their findings on the scope of the issue and making policy recommendations to combat it. The most interesting proposal among several: strikeback to re-capture stolen IP […]
September 24, 2012 by Nick Selby
This morning I saw that the folks over at the Cost-Benefit Knowledge Bank for Criminal Justice (CBKB) have been nominated for an Innovating Justice Award. Before I talk about the IJA, let me just mention that the work done by the CBKB is absolutely essential to law enforcement agencies across the United States (they’ve also […]
August 15, 2012 by Nick Selby
The United States Court of Appeals for the Sixth Circuit has ruled that police may track the signals eminating from wireless devices, such as cell phones, owned by a person. In United States v Skinner, the court found that a drug dealer whose position was being tracked by the DEA as he and his son […]
July 30, 2012 by Nick Selby
Over the weekend I read a piece in the US version of China Daily on some of the cyber crime issues being faced by China. The article reveals some interesting statistics about what China considers to be cyber crime. Apparently, in addition to traditional cyber criminal targets such as account details and personal information, the Chinese […]
June 27, 2012 by Nick Selby
Two significant cybercrime stories are making the rounds: the roll-up of an international sting against carders (see below) and details of a well-coordinated cyber operation targeting corporate bank accounts. There’s plenty of analysis out there on each of these stories so we’re going to give you some overview, some links to resources to get smart […]
June 11, 2012 by Nick Selby
This is Part I of a Three-Part Series on Cyber-criminal Operational Security. Part II is here. Part III is here. Recently, when speaking of a cyber case, I said that if your criminals have got an IQ of 101 or greater, and if they’re not pathologically lazy, they’re going to anonymize their traffic to the […]
June 5, 2012 by Nick Selby
I’m at a conference in Philadelphia today on Organized Retail Crime (an area I’m becoming increasingly passionate about) but I wanted to mention the publication by the Congressional News Service of an important document on cybercrime. And I’m not just saying it’s important because it echoes stuff we’ve said here for the last year! Cybercrime: […]
May 20, 2012 by Nick Selby
Let’s say some bad guys have stolen some credit card or bank account details and they’re using them to make a whole mess of online purchases. If they’ve got seven brain cells to rub together, they’re probably going to be using an anonymous proxy service to make the purchases. If they’ve got an IQ of 101 […]
December 24, 2013 by Nick Selby
0