Browsing All Posts filed under »Cyber Policy«

A New Hope…

December 24, 2013 by

0

Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]

Banning Feds From DefCon Is Self Defeating. Here’s Why.

July 11, 2013 by

12

If you’re not familiar with DefCon, the hacker confab that has been meeting in Vegas for more than 20 years, you’re not paying attention to hacking. DefCon (and the accompanying conferences like BlackHat and BSides) makes Vegas the nerdiest place in the universe during July. You don’t want to use an ATM, connect to a […]

Big Ears, Little Ears: One article, three layers of blown secrecy, and how Edward Snowden proves my point

June 18, 2013 by

3

Today’s guest post is from Eric Olson, author of the Digital Water blog and a previous contributor to PLI. Well, I haven’t had much time to write here for quite a while, but the Edward Snowden affair – and more specifically this piece in the Guardian – were such a terrific display of the Digital […]

Strikeback! Commission on IP Theft Report Gets All Ronin On China

May 23, 2013 by

0

A bipartisan group that studies the effects and impacts of IP theft in the US, The Commission on the Theft of American Intellectual Property, has released a report outlining their findings on the scope of the issue and making policy recommendations to combat it. The most interesting proposal among several: strikeback to re-capture stolen IP […]

CBKB Nominated for Innovating Justice Award

September 24, 2012 by

0

This morning I saw that the folks over at the Cost-Benefit Knowledge Bank for Criminal Justice (CBKB) have been nominated for an Innovating Justice Award. Before I talk about the IJA, let me just mention that the work done by the CBKB is absolutely essential to law enforcement agencies across the United States (they’ve also […]

Federal Court: Location Tracking via Cell-Phone Pinging is Kosher

August 15, 2012 by

2

The United States Court of Appeals for the Sixth Circuit has ruled that police may track the signals eminating from wireless devices, such as cell phones, owned by a person. In United States v Skinner, the court found that a drug dealer whose position was being tracked by the DEA as he and his son […]

Cybercrime Statistics: What Are The Chinese Counting?

July 30, 2012 by

4

Over the weekend I read a piece in the US version of China Daily on some of the cyber crime issues being faced by China. The article reveals some interesting statistics about what China considers to be cyber crime. Apparently, in addition to traditional cyber criminal targets such as account details and personal information, the Chinese […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

Cyber-Criminal OPSEC – a Three-Part Series. Part I: IP Addresses

June 11, 2012 by

5

This is Part I of a Three-Part Series on Cyber-criminal Operational Security. Part II is here. Part III is here. Recently, when speaking of a cyber case, I said that if your criminals have got an IQ of 101 or greater, and if they’re not pathologically lazy, they’re going to anonymize their traffic to the […]

II: Conceptual Issues for Congress and LE on Cybercrime

June 5, 2012 by

3

I’m at a conference in Philadelphia today on Organized Retail Crime (an area I’m becoming increasingly passionate about) but I wanted to mention the publication by the Congressional News Service of an important document on cybercrime. And I’m not just saying it’s important because it echoes stuff we’ve said here for the last year! Cybercrime: […]

Anonymous Proxy Hunting: When Bad Guys Don’t Leave You A Map To Their House (or, ‘An IP Address Is NOT an Internet Phone Number’)

May 20, 2012 by

6

Let’s say some bad guys have stolen some credit card or bank account details and they’re using them to make a whole mess of online purchases. If they’ve got seven brain cells to rub together, they’re probably going to be using an anonymous proxy service to make the purchases. If they’ve got an IQ of 101 […]

From CSO: There’s No 9-1-1 For Cybercrime

May 12, 2012 by

0

[This ran as an article in CSO Magazine Online] If you work for a large corporation, you hear lots of talk about corporate responsibility, and that’s great. But I can’t help but point out that, whether it is intentional, there is a massive and growing hypocrisy in the corporate world when it comes to prosecuting crime. […]

Arrests Made in LulzSec / Anonymous Cases

March 6, 2012 by

3

Fox News is reporting that after Hector Xavier Monsegur, AKA Sabu AKA @AnonymousSabu, a computer hacker associated with the criminal hacking groups Anonymous and LulzSec, was confronted with charges which would likely lead to two years in prison, he became a cooperating witness for the FBI. That, Fox reports separately, led to a number of arrests […]

When Stupid Strikes: Social Media Policy and Training

January 31, 2012 by

8

A Bay-area police agency has found itself at the center of a firestorm which began with comments on Twitter apparently by one of its officers. The officer apparently posted to a Twitter account the comment, “Get those fucking hackers. I’m a cop in the Bay Area CA. I’d go after them with both guns.” Awesome. […]