POPULARITY
This week Leonard Bailey, Head of Computer Crime and Intellectual Property Section's (CCIPS) Cybersecurity Unit for the Department of Justice (DOJ), Criminal Division, joins us this week. We dive into the role of the DOJ in addressing the vast and ever-changing landscape of cybersecurity. Bailey shares insights on partnering with federal agencies as well as the private sector, navigating information sharing pathways, evolution of incident and cyber threat reporting procedures, and the recent release of the Harmonization of Cyber Incident Reporting to the Federal Government. He also helps debunk information sharing myths and spotlights available tools and benefits of cyber threat information disclosure. Leonard Bailey The Head of Computer Crime and Intellectual Property Section's (CCIPS) Cybersecurity Unit and Special Counsel for National Security in the Department of Justice's (DOJ) Criminal Division. He has prosecuted computer crime cases and routinely advised on cybersecurity, searching and seizing electronic evidence, and conducting electronic surveillance. He has managed DOJ cyber-policy as Senior Counselor to the Assistant Attorney General for the National Security Division and then as an Associate Deputy Attorney General. He has also served as Special Counsel and Special Investigative Counsel for DOJ's Inspector General. Bailey is a graduate of Yale University and Yale Law School. He has taught law courses at Georgetown Law School and Columbus School of Law in Washington, DC. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e317
In this episode of “Financial Crime Matters,” Kieran talks with Claudia Quiroz, Director of the National Cryptocurrency Enforcement Team, or NCET, at the U.S. Justice Department. Claudia and Kieran discuss the rise in cryptocurrency-enabled crime that necessitated NCET's creation three years ago and the team's subsequent efforts to prosecute cyber predators and seize the proceeds of their crimes. Serving as a dedicated nerve center staffed by crypto experts within the Computer Crime and Intellectual Property Section of Justice, where Claudia is deputy chief, NCET pursues a variety of frauds and scams, money laundering and other abuses of cryptocurrency. During their talk, Claudia touches on some of NCET's cases, including against “Pig Butchering,” which she points out often involves two victims: the individual who is defrauded and enslaved individuals forced perpetrate the fraud.
Have you ever felt like a computer just refuses to work? Like a machine has a mind of it's own? In 1970 a hard drive at the National Farmers Union Corp. office decided to do just that. That year it started crashing for apparently no reason. It would take 2 years and 56 crashes to sort out the problem. The ultimate solution would leave more questions than answers. Was the hard drive haunted? Or was something else at play? Selected Sources: https://archive.org/details/computercrime0000mckn/page/98/mode/2up - Computer Crime https://archive.org/details/sim_computerworld_1972-08-02_6_31/mode/1up?view=theater - Computer World article
Dive deep into the legal intricacies of cybersecurity with me, Sean Gerber, as I guide you through the maze of laws and scams impacting our digital world. Prepare to arm yourself with knowledge that stretches far beyond the CISSP exam, as we tackle the multi-million-dollar repercussions of cybercrimes and the collaborative global efforts to combat them. This episode lays down the framework of civil, criminal, administrative, and contractual law, providing a comprehensive understanding crucial for every cybersecurity professional's arsenal.Unveil the complexities of intellectual property in the era of endless digital replication. From the subtleties of trademarks to the battleground of domain names, I'll share insights on the essential partnership between cybersecurity experts and legal teams. Real-life scenarios, such as the proprietary connectors dilemma, exemplify how patents can serve as a double-edged sword, propelling innovation while stirring up legal challenges. Our conversation is a stark reminder of the weighty responsibilities we bear in protecting the lifeblood of enterprises: their intellectual assets.In our final segment, we shift focus to the individual, dissecting laws like the ECPA and the Identity Theft and Assumption Deterrence Act that shield personal data against the prying eyes of cyber thieves. I'll also spotlight the cutting-edge CISSP Cyber Training career coaching program, designed to propel your cybersecurity career forward by ensuring your actions within the industry are as legally sound as they are technically proficient. Whether you're safeguarding bank transactions or navigating the nuances of GDPR, this episode is your guide to the legal obligations that come hand-in-hand with the title of cybersecurity professional.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
In Teil zwei dieser mehrteiligen Reihe über die Geschichte der IT-Sicherheit geht es heute um die 1960er Jahre. Zunächst geht es um die wichtigsten technologischen Innovationen der Zeit, namentlich die kleineren, schnelleren Mini-Computer, die in immer mehr Unternehmen und Universitäten Einzug erhalten. Die wichtigste Neuerung der Zeit ist das "time sharing", ein neuer Modus des Multitasking an Computern, welcher enorme IT-Sicherheitsimplikationen hat. Time Sharing erschafft das zentrale IT-Sicherheitsproblem überhaupt, nämlich dass sich Programme im Speicher gegenseitig manipulieren können. Mit time sharing verändert sich also der Computing Kontext, worum es im zweiten Kapitel geht. Zudem entstehen neue Bedrohungen, insbesondere die frühe Hackerkultur an den Unis. Wir beleuchten frühes Hacking wie "phone phreaking" und "dumpster diving". Das macht es erforderlich, dass neue IT-Sicherheitsmaßnahmen, wie z.B. Backup-Policies und die ersten Passwörter erfunden werden. Darum geht es in Kapitel 4. PS: Hier könnt ihr noch einmal die erste Folge nachhören und wer lieber liest, kann hier die englische Fassung der Folge über die 1960er nachlesen. Shownotes Computer History Timeline, https://www.computerhistory.org/timeline/ Meijer/Hoepman/Jacobs/Poll (2007), Computer Security Through Correctness and Transparency, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Yost (2007), A History of Computer Security Standards, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. DeNardis (2007), A History of Internet Security, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Brenner (2007), History of Computer Crime, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Biene-Hershey (2007), IT Security and IT Auditing Between 1960 and 2000, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. PDP-1 - Wikipedia Apollo Guidance Computer - Wikipedia Sabre (travel reservation system) - Wikipedia The first industrial robot, https://www.automate.org/robotics/engelberger/joseph-engelberger-unimate Steven Levy, Hackers, https://www.gutenberg.org/cache/epub/729/pg729-images.html https://en.wikipedia.org/wiki/Darwin_(programming_game) Time Sharing, https://www.youtube.com/watch?v=Q07PhW5sCEk Percepticon Folge zum ARPANET, https://open.spotify.com/episode/1pirIO5dgnvGfneWmeYBbj Timecodes 01:05 Kapitel 1: Erfindungen der 1960er, PDP-1 03:00 neue Computer Anwendungen, Programmiersprachen, Miniaturisierung 05:30 Digitalisierung der Wirtschaft, SABRE, Robotik, Modems 09:07 Kapitel 2: Computing in frühen Rechenzentren, Computer Priesthood‚ 13:06 Compatible Time Sharing System 17:20 Kapitel 3: Bedrohungen, 18:30 Das IT-Sicherheitsproblem schlechthin, DARWIN 22:06 Willis Ware Report 25:50 Hacker Kultur, phone phreaking, dumpster diving 31:05 Kapitel 4: IT Sicherheitskontrollen, Security Policies, Backups, Passwörter Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter. Dieser Cyber Security Podcast erscheint auf iTunes, Spotify, PocketCast, Stitcher oder via RSS Feed. Am Anfang folgt noch ein kleiner Nachtrag zur letzten Folge mit den Top 10 IT-Sicherheitstipps, nachdem mich etwas Feedback dazu erreichte. Sound & Copyright Modem Sound, Creative Commons. © Vint Cerf, "Internet shows up in December 1975", in: IEEE Computer Society, Computing Conversations: Vint Cerf on the History of Packets, December 2012. © L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998.
This week Leonard Bailey, Head of Computer Crime and Intellectual Property Section's (CCIPS) Cybersecurity Unit for the Department of Justice (DOJ), Criminal Division, joins us this week. We dive into the role of the DOJ in addressing the vast and ever-changing landscape of cybersecurity. Bailey shares insights on partnering with federal agencies as well as the private sector, navigating information sharing pathways, evolution of incident and cyber threat reporting procedures, and the recent release of the Harmonization of Cyber Incident Reporting to the Federal Government. He also helps debunk information sharing myths and spotlights available tools and benefits of cyber threat information disclosure. Leonard Bailey The Head of Computer Crime and Intellectual Property Section's (CCIPS) Cybersecurity Unit and Special Counsel for National Security in the Department of Justice's (DOJ) Criminal Division. He has prosecuted computer crime cases and routinely advised on cybersecurity, searching and seizing electronic evidence, and conducting electronic surveillance. He has managed DOJ cyber-policy as Senior Counselor to the Assistant Attorney General for the National Security Division and then as an Associate Deputy Attorney General. He has also served as Special Counsel and Special Investigative Counsel for DOJ's Inspector General. Bailey is a graduate of Yale University and Yale Law School. He has taught law courses at Georgetown Law School and Columbus School of Law in Washington, DC. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e267
Warum nicht mal was Neues? Hier seht ihr den Kickoff meiner ersten Reihe, die sich über mehrere Folgen erstreckt und sich mit einem bedeutenden Thema befasst: der Geschichte der Informationssicherheit bzw. später dann Cybersicherheit. In den kommenden Folgen werde ich die bedeutendsten historischen Entwicklungen in der Cybersicherheit beleuchten. Die Folgen werden jeweils 1 oder maximal 2 Dekaden abdecken, also jeweils 10 Jahre. Jede Folge hat 4 Kapitel. Kapitel 1 wird den Kontext oder die Geschichte selbst beschreiben, indem wichtige Ereignisse in der IT- und IT-Sicherheitsgeschichte beleuchtet werden. Dabei geht es um die Einführung bestimmter Technologien, bedeutende Angriffe, die Entwicklung von Konzepten sowie die Verabschiedung von Gesetzen und ähnlichem. Kapitel 2 wird den Computing-Kontext beschreiben und aufzeigen, wie Computer in der jeweiligen Zeit genutzt wurden. Die Verwendung von Computern hat Implikationen für die Sicherheit, und es ist faszinierend zu sehen, wie sich die Nutzung von Computern im Laufe der Zeit verändert hat. Kapitel 3 wird sich mit der Entwicklung der Bedrohungen in der IT-Landschaft befassen und diese charakterisieren. Dabei werden die Veränderungen der Bedrohungslandschaft im Laufe der Zeit beleuchtet. Kapitel 4, eng mit Kapitel 3 verknüpft, wird die Entwicklung der IT-Sicherheit diskutieren. Hierbei werden die Maßnahmen betrachtet, die ergriffen wurden, um die Sicherheit zu erhöhen. Dies umfasst technische, organisatorische, politische und rechtliche Maßnahmen.Bleibt dran, denn in den kommenden Folgen werden wir tiefer in die Geschichte der Cybersicherheit eintauchen und die Entwicklung dieser faszinierenden Disziplin genauer betrachten. Wir starten in den 1940er und 1950er Jahren und Reden über Tonnenschwere Computer, manuelle Programmierung mittels Schaltern und Kabeln, Bugs in Transistorröhren und die Bedrohung durch Agenten, Spionage und elektromagnetische Emissionnen. Computersicherheit ist in dieser Zeit in erster Linie physische Sicherheit. Viel Spaß mit der spannenden Geschichte der Cybersicherheit! PS: Falls ihr alles nochmal nachlesen wollt, habe ich aus der Folge auch einen englischen Blogpost gemacht: percepticon.de/2023/the-history-of-cybersecurity-pt-1-1940s-1950s/ Shownotes Computer History Timeline, https://www.computerhistory.org/timeline/1947/ Meijer/Hoepman/Jacobs/Poll (2007), Computer Security Through Correctness and Transparency, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Yost (2007), A History of Computer Security Standards, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. DeNardis (2007), A History of Internet Security, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Brenner (2007), History of Computer Crime, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Biene-Hershey (2007), IT Security and IT Auditing Between 1960 and 2000, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Espionage and the Manhattan Project, https://www.osti.gov/opennet/manhattan-project-history/Events/1942-1945/espionage.htm Timecodes 2:40 Anfang, aber wo? 4:06 Kapitel 1. Anfang: 1940er, Z3, Bombe, ENIAC 7:10 Kapitel 2. Computing. Lochkarten, Schaltersteuerung und batch processing 10:30 Kapitel 3. Bedrohungen. Insider, Agenten, Emissionen Bedrohungen 11:00 Manhattan projekt 13:40 Tempest 15:00 Kapitel 4. IT-Sicherheitskontrollen. Physische Sicherheit 16:19 MAC 18:20: Ausblick 1950er: Magnetspeicher, FORTRAN, SAGE und integrierte Schaltkreise Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter.
By Adam Turteltaub Economic espionage sounds more like the stuff of a spy thriller than a day-to-day concern for business. Not so, as it turns out. To learn more we sat down with the FBI's Counterintelligence Division Unit Chief Matthew Charles and Cyber Division Supervisory Special Agent Michelle Liu. Economic espionage generally refers to stealing trade secrets for the benefit of an overseas competitor, often one aligned with a foreign government. An employee at your organization working on a sensitive project may be leveraged, frequently with the lure of cash and other payments. Typical targets include technology with potential military use and, of late, pharmaceuticals. To counter this threat, the FBI Cyber Division maintains partnerships with many private sector companies to identify nefarious conduct on their networks. Meantime the Counterintelligence Division looks upstream for actors coming into the US seeking access to US technology. So what should companies do? First, protect yourself. Encryption can be helpful along with limiting access to sensitive information only to key people. Make sure, too, to track who in your firm is accessing trade secrets. Also, be sensitive to unusual employee behaviors or changes in affluence levels. An employee suddenly downloading large files at night, emailing their personal email address sensitive information or whose debt problems have inexplicably disappeared could be engaged in economic espionage. Just don't jump to any conclusions. There could be legitimate reasons for these actions. Second, the FBI advises reaching out to them when an incident occurs. The FBI can't investigate without ongoing collaboration of the victim organization. They also advise that it is never too early to call them in, and if you do not want them there, they will pull out. Finally, take the time to leverage government resources. Be sure to familiarize yourself with the US Department of Justice's Criminal Division's Computer Crime and intellectual Property Section (CCIPS) website. You will find there information on reporting computer, internet-related or intellectual property crime. And, of course, listen in to the podcast to learn more about the risks of economic espionage and what you can do to mitigate it.
Imagine a world where your private medical records are no longer private, where unscrupulous cybercriminals are ready to exploit your personal data for blackmail. That's the chilling reality we explore as we uncover an alarming trend of cybercriminals targeting plastic surgeons, highlighting the increasing importance of cybersecurity across diverse industries. This episode also serves as a treasure chest of insights for those pursuing a CISSP certification. Grappling with complex legalities of contractual law, understanding cybersecurity legislation, and interpreting computer crime acts can be daunting. We aim to demystify these intricacies and navigate you through important CISSP topics. Hear about how coaching and mentoring can supercharge your CISSP journey and learn strategies for preparing impactful resumes and tackling interview questions effectively. Tune in and gear up to bolster your cybersecurity knowledge and career prospects.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Discover the world of CISSP Cyber Training in a thrilling exploration that unravels the complex web of cybersecurity legislation, contractual law, and computer crimes acts. We'll begin our journey by studying recent cybercrimes, with a focus on the Singapore government and the US pledge to fight scams through cross-border cooperation. With the alarming statistic of scam losses in the US reaching around $10.3 billion last year, we aim to illuminate the critical importance of understanding these laws for your CISSP exam.Intrigued about how various laws affect the protection of intellectual property? We've got you covered. We'll decipher the intricacies of civil, criminal, administrative and contractual law, and their implications on protecting trademarks, patents, and trade secrets. You'll be privy to in-depth conversations about working with attorneys when drafting contracts, and understand the legal recourse available if a vendor misplaces information. We'll also guide you through the steps to tackle issues such as domain name scams.But that's not all. We venture into computer crime laws and their implications, focusing on the Computer Fraud and Abuse Act (CFA) and the Electronic Communications Privacy Act (ECPA). We'll examine the Electronic Funds Transfer Act of 1978, the Stored Communications Act, and discuss their impact on privacy and legal considerations related to accessing or disclosing electronic data. We'll also probe the Data Protection Act in the UK and the Identity Theft and Assumption Deterrence Act. To top it off, we have a unique segment on career coaching for CISSP Cyber Training. We'll share with you, invaluable tips on acing the CISSP exam, crafting compelling resumes and acing interviews. So, get ready to embark on a thrilling journey that will equip you with the essential training to excel in your cybersecurity career!Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
What do we mean when we talk about "cybersecurity"? There's clearly a technical component: can someone prevent, through clever hardware and software, someone else from accessing some device or data? But that just raises the question of who should have access. And that's not a technical question. It's a legal, social, and moral one.This, at least, is the argument made by Josh Goldfoot, Principal Deputy Chief at the Department of Justice's Computer Crime and Intellectual Property Section, the nerve center of the federal government's attempt to prosecute cyber criminals. A litigator and policy lawyer with decades of experience thinking about cybersecurity and digital surveillance, Josh just published a paper for Lawfare's ongoing Digital Social Contract research paper series making his case for why cybersecurity isn't just a technical problem. Alan Rozenshtein, Associate Professor of Law at the University of Minnesota and Senior Editor at Lawfare, spoke to Josh about his paper and what viewing cybersecurity as a social, not just engineering, problem means for our ongoing efforts to secure our digital lives.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Overnighters, Episode 617: Wright's Bitcoin Claim Advances Razzlekhan's Bitfinex Hack Plea Deal DOJ Boosts Crypto Oversight SEC's Token Stance Challenged Celsius Nears Settlement ISIS Turns to Crypto The TL;DL Wright's Bitcoin Claim Advances - Craig Wright's claim to Bitcoin copyright advances as a UK court allows him to argue that the Bitcoin file format qualifies for copyright protection. The case potentially influences Bitcoin's future use and intellectual property law. Razzlekhan's Bitfinex Hack Plea Deal - Ilya Lichtenstein and Heather Morgan, involved in the 2016 Bitfinex hack, reach a plea deal with U.S. prosecutors. However, U.S. officials may have underestimated the amount of seized crypto by $1 million. DOJ Boosts Crypto Oversight - The U.S. Department of Justice merges the National Cryptocurrency Enforcement Team into the Computer Crime and Intellectual Property Section. This move doubles the number of attorneys working on crypto matters. SEC's Token Stance Challenged - Ripple's Chief Legal Officer, Stuart Alderoty, challenges SEC Chair Gary Gensler's assertion that many cryptocurrency tokens could fall under the jurisdiction of the Securities Act. The debate could significantly impact future cryptocurrency regulation. Celsius Nears Settlement - Bankrupted crypto lender, Celsius Network, reaches two settlements potentially ending its bankruptcy proceedings. The settlements could lead to the return of assets to customers and address $78.2 billion in unsecured claims. ISIS Turns to Crypto - According to TRM Labs, terrorist groups, particularly those associated with ISIS, are increasingly using cryptocurrencies for fundraising. The decentralized nature of crypto allows these groups to operate under the radar, raising significant amounts of money. Crypto Overnighter Podcast (7/22/2023): Welcome back to the Crypto Overnighter with your host, Nikodemus. We provide nightly updates on cryptocurrency, NFTs, the metaverse, and the surrounding industry. Remember, this show does not offer financial advice. Email: nick@cryptoovernighter.com Salem Friends of Felines: https://sfof.org/ Twitter: https://twitter.com/CryptoCorvus1
The Cybersecurity Information Sharing Act of 2015 was Congress' fix to the confusing statutes that regulated the cyber threat information that could pass between the private sector and the federal government. Eight years later, many people still don't know the law exists or what a valuable tool it can be. In this episode, guest Leonard Bailey, head of Computer Crime and Intellectual Property Section's Cybersecurity Unit with the Department of Justice, explores the Cybersecurity Information Sharing Act and its benefits.
Richard Hatem joins Mike and Chris to talk about the final episodes of Season 5 of Barney Miller. It was a very strong season and ends with a very poignant episode wherein the members of the "Old One Two" reminisce about Jack Soo, the actor, and Yamana, the character.This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/4186832/advertisement
We have a little more clarity on Michigan football co-offensive coordinator Matt Weiss' alleged 'computer crimes.' We get into all of that before going game-by-game to break down where the Wolverines and their opponent stand as of current and what we expect to happen.Support Us By Supporting Our Sponsors!LinkedInLinkedIn jobs helps you find the candidates you want to talk to, faster. Post your job for free at Linkedin.com/lockedoncollege Terms and conditions apply.Built BarBuilt Bar is a protein bar that tastes like a candy bar. Go to builtbar.com and use promo code “LOCKEDON15,” and you'll get 15% off your next order.BetOnlineBetOnline.net has you covered this season with more props, odds and lines than ever before. BetOnline – Where The Game Starts! Learn more about your ad choices. Visit podcastchoices.com/adchoices
We have a little more clarity on Michigan football co-offensive coordinator Matt Weiss' alleged 'computer crimes.' We get into all of that before going game-by-game to break down where the Wolverines and their opponent stand as of current and what we expect to happen. Support Us By Supporting Our Sponsors! LinkedIn LinkedIn jobs helps you find the candidates you want to talk to, faster. Post your job for free at Linkedin.com/lockedoncollege Terms and conditions apply. Built Bar Built Bar is a protein bar that tastes like a candy bar. Go to builtbar.com and use promo code “LOCKEDON15,” and you'll get 15% off your next order. BetOnline BetOnline.net has you covered this season with more props, odds and lines than ever before. BetOnline – Where The Game Starts! Learn more about your ad choices. Visit podcastchoices.com/adchoices
What makes the world go round? It is increasingly obvious that today the answer is "data" – specifically, data about individuals that companies collect, transmit, and store. Understandably, governments seek access to that data to protect national security and public safety, but such access raises serious privacy concerns, both at home and abroad. This week's episode features an expert panel from our CLE conference this past February. The panel discusses the various angles of data privacy, as well as the national security benefits and risks of international data flows. To hear the entirety of this panel discussion, please visit our website: https://www.americanbar.org/groups/law_national_security/events_cle/national-security-law-cle-webinar-series-2022-emerging-critical-issues/recording-national-security-law-cle-conference-emerging-critical-issues/ For more information on our past CLE Conference: Emerging Critical Issues: https://www.americanbar.org/groups/law_national_security/events_cle/national-security-law-cle-webinar-series-2022-emerging-critical-issues/ This panel was moderated by Alex Joel, Scholar-in-Residence and Adjunct Professor at the Washington College of Law: https://www.wcl.american.edu/community/faculty/profile/ajoel/bio Ben Huebner is Chief, ODNI Civil Liberties, Privacy and Transparency Office: https://www.dni.gov/index.php/component/content/article?id=350&Itemid=800 Leonard Bailey is Head of Computer Crime and Intellectual Property Section's (CCIPS) Cybersecurity Unit and Special Counsel for National Security in the Department of Justice's (DOJ) Criminal Division: https://www.law.georgetown.edu/national-security-center/our-team/leadership-staff/leonard-bailey/ Estelle Masse is Europe Legislative Manager and Global Data Protection Lead at Access Now: https://www.accessnow.org/profile/estelle-masse/ Stewart Baker is Of Counsel at Steptoe: https://www.steptoe.com/en/lawyers/stewart-baker.html References: Register for the 32nd Annual Review of the Field of National Security Law Conference – The Past, Present and Future: Celebrating 60 Years of the Standing Committee on Law and National Security – November 17th–18th, 2022: https://web.cvent.com/event/587890d9-7f23-4662-af87-6f106dedfece/summary The EU General Data Protection Regulation (GDPR): https://www.trade.gov/european-union-data-privacy-and-protection Carpenter v. United States: https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf Riley v. California: https://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf Paul Ohm, "The Broad Reach of Carpenter v. United States." Just Security. June 27, 2018: https://www.justsecurity.org/58520/broad-reach-carpenter-v-united-states/ The Fourth Amendment Third Party Doctrine: https://sgp.fas.org/crs/misc/R43586.pdf Leaders of A Beautiful Struggle v. Baltimore Police Department: https://www.ca4.uscourts.gov/opinions/201495A.P.pdf Smith v. Maryland: https://supreme.justia.com/cases/federal/us/442/735/ E.O. 12333: https://dpcld.defense.gov/Portals/49/Documents/Civil/eo-12333-2008.pdf
Cryptocurrency continues to dominate the headlines, from starting the year at a high with major TV ads to questions in recent weeks about the stability of the market. In this episode of In the Public Interest, co-host and Partner John Walsh is joined by fellow Partners Tiffany Smith and Zachary Goldman to explore the world of Web3 with Jai Ramaswamy. Ramaswamy is the Chief Legal Officer at Andreessen Horowitz—otherwise known as “A16Z,” an ode to the practice of shortening long words used repeatedly in code by taking the first and last letter of a word and the number of letters in between. Prior to joining A16Z, Ramaswamy served as the Chief Risk and Compliance Officer at cLabs. He has over a decade of experience at the Justice Department, first serving as a prosecutor focused on white collar crime and cybercrime in the Southern District of New York and later as Chief of the Asset Forfeiture and Money Laundering Section. Ramaswamy also worked in the Computer Crime and Intellectual Property Section at the Justice Department. Smith and Goldman regularly advise clients on regulatory issues related to cryptocurrency and the broader FinTech sector. Both write frequently on regulatory developments affecting the Web3 space, including cryptocurrency and stablecoins. Smith, Goldman and Ramaswamy probe the many applications of decentralized systems in Web3, from cryptocurrency to NFTs and beyond. Ramaswamy shares why he believes regulatory concerns—not technology issues—will be the principal roadblock in this new decentralized ecosystem. The episode also touches on the delicate balancing act of promoting innovation while mitigating the emerging risks associated with decentralized computing.
The Compliance Life details the journey to and in the role of a Chief Compliance Officer. How does one come to sit in the CCO chair? What skills does a CCO need to navigate the compliance waters in any company successfully? What are some of the top challenges CCOs have faced, and how did they meet them? These questions and many others will be explored in this new podcast series. Over four episodes each month on The Compliance Life, I visit with one current or former CCO to explore their journey to the CCO chair. This month, I am joined by Scott Garland, Managing Director at AMI. Scott came to AMI from the DOJ, where he held the role of Professional Responsibility Officer. As he described, it was akin to a CCO role for the US Attorney's Office for Massachusetts. With a knack for understanding technology, relating it to legal issues, and translating it for lawyers, judges, and juries, Garland went to the DOJ, working at Main Justice in Computer Crime & Intellectual Property Section in DC. His work there included criminal investigations and trials, policy analysis, and drafting manuals. From that position, he moved to Boston to the US Attorney's Office for the District of Massachusetts. He began in the Cybercrime Unit, then National Security Unit, eventually becoming NSU's Deputy Chief, then Acting Chief of the Unit. Along the way, he picked up a variety of advisory responsibilities: identity theft coordinator, committee on dealing with cooperating witnesses, and grand jury supervisor. Resources Scott Garland's Profile on AMI Learn more about your ad choices. Visit megaphone.fm/adchoices
Interviews with instructors and students at the world-wide training event held by the International Association of Computer Investigative Specialists (IACIS).
And faces up to 10 years in prison for $80 worth of merchandise. www.patreon.com/stevelehto
Today we talk with Craig Bowling, a computer forensic examiner, a former federal agent and current President and founder of Digitas Consulting, LLC. Craig has a great story regarding an investigation he and his team undertook in the days after the events of 9/11, and spanned years. Also, my partner Jason G. Weiss is back! We discuss a few interesting topics in our lead-up to Craig's interview.
In this episode, I start out talking to someone very close to me about the violence against police officers in this country. In our main story, I'll talk about a murder case I worked on where the computer analysis provided information that helped make the case. The story does contain some graphic content, so consider this before listening.
In this episode, we talk with Gene Shantz, former police officer and sergeant for Flagstaff Arizona Police Department. Gene and I talk about several of our cases, but in particular, Gene tells me about a case where he manually rebuilt a partition from a corrupted VMDK image in order to access the data. That is some good work. I hope you enjoy it as much as I did!
Mag de politie uw computer hacken en wat verklappen uw printer en wagen? Hoofdinspecteur Dominique Houbrechts geeft tips aan slachtoffers die cybercrime willen aangeven, maar doorstaat hij zelf onze phishing-quiz? U laat zich uiteraard niet vangen in de zee van big data en herinnert zich precies hoeveel kerstpakjes u online bestelde, toch?
Today I talk with Becky Passmore, former computer forensic examiner and instructor for the FBI. Becky has had a long, very productive career working for the FBI and shares some insights into working for them. She'll also share an interesting story involving cell phone forensics and how important it is to sometimes dig a little deeper.
In this inaugural episode, Jason and Mark introduce themselves, tell you all where they came from, and how they got started performing computer forensics, and they each share details from one of their cases. This is Mark's first attempt at creating a podcast, so apologies if the sound quality is not quite what it should be. We promise, it will get better! Any feedback is welcome and you can email us at computercrimechronicles@gmail.com.
Jeff Coleman is a man that has a moonlighting gig from his moonlighting gig. During the day he works as a first responder for an office technology company, and at night he has played in a series of Connecticut punk rock bands, founded and managed a record label that brought attention to the Puerto Rican hardcore scene and more recently created a series of viral videos with his collection of Evel Knievel stunt cycles. A friend of the podcast for many years, we talk about the daily work grind, living (and driving) with epilepsy, Ian MacKaye in a towel and how you can tell if someone is fucking with the office copier. Check it out! For Full Length Episodes And Merchandise Go To https://www.patreon.com/killedbydesk Follow: Killed By Desk Insta: @killedbydeskpodcast Twitter: @killedbydesk Facebook: https://www.facebook.com/killedbydesk LinkedIn: https://www.linkedin.com/company/killedbydesk Links: Jeff's Evel Videos & other videos https://www.youtube.com/user/mrcool665/videos Jeff's Discogs https://www.discogs.com/artist/1841000-Jeff-Spaz https://www.discogs.com/artist/2223902-Jeff-Coleman-2 Computer Crime https://www.facebook.com/watch/compcrimerecs/ https://www.discogs.com/label/97615-Computer-Crime-Records Seizure https://www.youtube.com/watch?v=Psh94u3LZTg La Decadencia del Cuchifrito Video Compilation https://fb.watch/9qMA0Ljown/ Evidence of Perdue Restaurant in Queens https://timesmachine.nytimes.com/timesmachine/1981/02/07/254964.html Snake River https://www.youtube.com/watch?v=2p1khN1xyBw Dictaphone https://www.youtube.com/watch?v=pv_JpyteISI Anthrax Club https://www.youtube.com/watch?v=ybw_ffqDfHY Ricoh Service https://www.youtube.com/watch?v=I_Vp-4gK4Mw 90210 Trailers https://www.youtube.com/watch?v=MLzNE2J3Z38 Rice Beans & Fat Asses https://www.youtube.com/watch?v=TKekarG6roY
A quick introduction to our new podcast involving crimes committed with the use of computers, cell phones, and other electronic devices.
Brief history and purpose of the CFAA. Discussion of the majority and dissenting "Van Buren" opinion. Implications for the computer forensic and security profession. Segment Resources: https://www.supremecourt.gov/opinions/20pdf/19-783_k53l.pdf Prosecuting Computer Crimes DOJ,: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf "Computer Crime and Intellectual Property Section DOJ": https://www.justice.gov/criminal-ccips/ccips-documents-and-reports Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw700
Brief history and purpose of the CFAA. Discussion of the majority and dissenting "Van Buren" opinion. Implications for the computer forensic and security profession. Segment Resources: https://www.supremecourt.gov/opinions/20pdf/19-783_k53l.pdf Prosecuting Computer Crimes DOJ,: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf "Computer Crime and Intellectual Property Section DOJ": https://www.justice.gov/criminal-ccips/ccips-documents-and-reports Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw700
This week, we kick off the show with an interview featuring Jim O'Gorman, Chief Content and Strategy Officer at Offensive Security, to talk Career Pathing and Advice from Offensive Security! Then, Thomas Lonardo, an Associate Professor at Roger Williams University, joins to discuss the recent US Supreme Court Case ruling of Van Buren v. US! In the Security News, Windows 11, Drive-by RCE, Cookies for sale, McAfee has passed away, 30 Million Dell Devices at risk, & more! Show Notes: https://securityweekly.com/psw700 Segment Resources: Visit https://securityweekly.com/offSec to learn more about them! https://www.supremecourt.gov/opinions/20pdf/19-783_k53l.pdf: Prosecuting Computer Crimes DOJ,: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf "Computer Crime and Intellectual Property Section DOJ": https://www.justice.gov/criminal-ccips/ccips-documents-and-reports Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we kick off the show with an interview featuring Jim O'Gorman, Chief Content and Strategy Officer at Offensive Security, to talk Career Pathing and Advice from Offensive Security! Then, Thomas Lonardo, an Associate Professor at Roger Williams University, joins to discuss the recent US Supreme Court Case ruling of Van Buren v. US! In the Security News, Windows 11, Drive-by RCE, Cookies for sale, McAfee has passed away, 30 Million Dell Devices at risk, & more! Show Notes: https://securityweekly.com/psw700 Segment Resources: Visit https://securityweekly.com/offSec to learn more about them! https://www.supremecourt.gov/opinions/20pdf/19-783_k53l.pdf: Prosecuting Computer Crimes DOJ,: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf "Computer Crime and Intellectual Property Section DOJ": https://www.justice.gov/criminal-ccips/ccips-documents-and-reports Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
von Matthias Haenel
After the deep dive on ransomware payments and how to beat back this latest crime wave, we spend several minutes in the Rapid Rundown NOT talking about the Colonial Pipeline ransomware event. Instead, we jump into Google's renewed push for automatic enrollment in 2FA, I mean, 2SV. Hooray MFA!Links:Read the Ransomware Task Force Report (mentioned throughout the episode)See Bleeping Computer's coverage of Google's default 2SVBiographical notes:Megan Stifel is Executive Director, Americas, at the Global Cyber Alliance. She previously served as Cybersecurity Policy Director at Public Knowledge. Prior to her work with nonprofits Megan served as a Director for International Cyber Policy at the National Security Council and in the U.S. Department of Justice, including as Director for Cyber Policy in the National Security Division and as counsel in the Criminal Division’s Computer Crime and Intellectual Property Section.Ms. Stifel was previously in private practice, where she advised clients on sanctions and FCPA compliance. Before law school, Ms. Stifel worked for the U.S. House of Representatives Permanent Select Committee on Intelligence. She received a Juris Doctorate from the Maurer School of Law at Indiana University, and a Bachelor of Arts, magna cum laude, from the University of Notre Dame. She is a partner with Social Venture Partners Charleston.Professor Ciaran Martin, CB, is Professor of Practice at the Blavatnik School of Government at the University of Oxford. He is also an adviser to Paladin Capital in the United States, and Garrison Technology Ltd in the United Kingdom.For six and a half years ending in the middle of 2020, Ciaran led the UK Government’s work on cybersecurity. This included establishing the National Cyber Security Centre in 2016. The UK NCSC is now recognized as one of the leading public authorities in the world for cybersecurity, and Ciaran has been running it for its first four years. During Ciaran’s tenure, the UK rose from eighth to first in the International Telecommunications Union’s Global Cybersecurity Index. The NCSC’s approach to intervening to make technology safer–and easier to use safely–as well as managing national level incidents proactively has been lauded around the world. Ciaran has been honored within the UK, Europe, the United States, and beyond for his groundbreaking efforts to combat cyber threats.Prior to running the NCSC, Ciaran held a series of senior roles in the UK Cabinet Office. As Director of Constitution, he oversaw the agreement for arrangements for the Scottish Independence Referendum in 2014. He also served as Director of Security and Intelligence as well as head of the Cabinet Secretary’s office. Additionally, he has worked in the UK Treasury and National Audit Office. Originally from Northern Ireland, he holds a first-class degree in history from the University of Oxford.
Today, we sit down with Paul Ohm, the Associate Dean of Academic Affairs at Georgetown Law, to talk about technology and surveillance in the classroom. Dean Ohm was previously a federal prosecutor at the Department of Justice's Computer Crime and IP Section. He is an expert in the areas of surveillance and law. He discusses how his work on surveillance has impacted classroom recordings at Georgetown and lessons learned to guide the future of technology development. Join us for an inside look at the decisions Georgetown has made around technology in the classroom, in-person and online, and how that interacted with Georgetown's response to the COVID-19 pandemic.
Mark Rasch is an Adjunct Professor of Law at George Washington University Law School and had a career at the Department of Justice where he led their efforts to combat cybercrime and high technology crime, which led to the establishment of the Computer Crime and Intellectual Property Section within the Criminal Division of DOJ. He has also served as a chief privacy officer in the private sector.*****Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org
In this episode of CHATTINN CYBER, Marc Schein interviews Sean Hoar, of Lewis Brisbois and chair of the Data Privacy & Cybersecurity Practice. He has extensive experience managing responses to digital crises and effectively marshaling resources to contain and remediate information security incidents. He served as the lead cyber attorney for the U.S. Attorney’s Office in Oregon, and he worked closely with the Computer Crime & Intellectual Property Section in Washington D.C. He holds the Certified Information Systems Security Professional (CISSP), the Global Information Security Professional (GISP), and the Certified Information Privacy Professional/United States (CIPP/US. Sean served in the US Attorney’s Office for many years where he handled career cases that exposed him to the digital world of electronic surveillance. He believes that cyber hackers have evolved fast and have become more sophisticated over the years, leveraging the systems and applications. Sean explains that as long as cybercriminals are able to monetize data; ransom and other exploits are going to continue, the most dangerous of which right now is extortion. Sean explains how he advises his clients to give information to the FBI who gather evidence across the country and attribute each case to malicious actors, they hold them accountable, and criminally charge them. Sean explains why security starts with setting up foundational basics in an organization. He also describes the criteria they use to ensure advanced cybersecurity for their clients: they make sure the internal teams understand what they’re supposed to do, and the external teams stay in touch with their obligations. Companies need to put cyber procedures in place to avoid financial consequences in the long run if they are not proactive. “But for me, it’s a matter of helping them really visualize what it will look like, and until they understand that, it’s going to be hard to get them to take action.” Companies that carry cyber insurance are well educated and have immediate attention and deployment of resources they need to go from one side to the other, which limits the expense and the impact of the attack. Companies without insurance, on the other hand, struggle on who they should call because they don’t have the education and systems in place to go from one side to the other. They contact the wrong people which results in more confusion and expenses. What You Will Learn: The danger of cyber ransom exploits and extortion in risking data privacy online. Why cybercrimes are only going to increase in the future and become more dangerous How Sean helps his clients visualize their cyber exposure procedure as a long-term financial investment. The difference between companies that carry cyber insurance and those who don’t. The tools that Sean created to deal with information security control assessments and response planning for the private sector. The power of building a stable effective team with the right attitude.
Tips to prevent the Cyber Grinch from stealing Christmas GUEST - Ilia Lvovski - BCIT Digital Forensics and Computer Crime expert and instructor
Chapter 1: Abbotsford Police Chief's message to people breaking COVID-19 orders? GUEST - Mike Serr - Abbotsford Police Chief Chapter 2: A well known BC lawyer who made history several times has passed away. Remembering Joe Arvay. GUEST - Wally Oppal - Former Judge/MLA/current lawyer Chapter 3: Tips to prevent the Cyber Grinch from stealing Christmas GUEST - Ilia Lvovski - BCIT Digital Forensics and Computer Crime expert and instructor Chapter 4: Can your employer force you to get the COVID-19 vaccine? GUEST - Lia Moody - Employment Lawyer, Samfiru Tumarkin Chapter 5: MP Albas on beer, wine, spirits private member's bill GUEST - Dan Albas - Conservative MP, Shadow Minister for Environment and Climate Change Chapter 6: A B.C.'s Principal's message on the stigma of COVID-19 GUEST - Principal Rob Clark - Silverdale Elementary in Mission Chapter 7: How to make your “digital Christmas” a little easier for you and the family GUEST - Andy Baryer with Jawn Jang
Three things to know today SMB data from the UK https://www.computerweekly.com/microscope/news/252492950/SME-customers-showing-signs-of-coronavirus-impact Computer crime and the Supreme Court https://www.protocol.com/van-buren-v-united-states-supreme-court https://www.washingtonpost.com/politics/2020/12/01/cybersecurity-202-supreme-court-may-finally-rein-an-outdate-anti-hacking-law/ AND A hack with no physical contact https://www.theverge.com/2020/12/1/21877603/apple-iphone-remote-hack-awdl-google-project-zero
Science journalist Dirk Hanson was among the first reporters assigned to cover Silicon Valley in the 70's and 80's. While working for Electronic News he developed relationships with the major players who created the hardware and software used to build the Internet. Hanson wrote two highly praised books on the digital revolution -- The New Alchemists: Silicon Valley and the Microelectronics Revolution (Little, Brown), and a techno-thriller, The Incursion that revealed the potential vulnerability of the evolving Internet. Both books were highly praised by the New York Times, Los Angeles Times, Fortune, New Yorker and other publications. Note: The Incursion has been revised and just released as The Seventh Level. Hanson's articles have appeared in California Magazine, Omni, CoEvolution Quarterly, and the Whole Mind Newsletter. Dirk graduated from Iowa State University with a B.S. degree in Journalism and received his M.A. degree in Humanities from California State University. - www.dirkhanson.com
Cyber attacks on Australian government agencies and businesses are rising to a level that the defence minister says is 'blurring the lines between peace and war'. The escalation has happened despite the Federal Government calling out the action earlier this year. - पछिल्लो समयमा अस्ट्रेलियाली सरकारी निकाय र व्यापारहरू माथि साइबर आक्रमण बढ्दै आइरहेको छ। सङ्घीय सरकारले यसको बारेमा सार्वजनिक चेतावनी दिए पश्चात् पनि यस किसिमका आक्रमणहरू निरन्तर बढिराखे पछि सङ्घीय रक्षा मन्त्री लिन्डा रेनल्ड्सले "शान्ति र युद्धको बिचको भिन्नता नै धमिलो भैरहेको बताएकी छिन्।
Cyber attacks on Australian government agencies and businesses are rising to unprecedented levels, says Linda Burney.
#RedVestBrigade #Trump2020 #President Trump #PeteSantilli #TRUMPTWEETS #Corona Virus, #CoronaVirusUpdate THE PETE SANTILLI SHOW Episode #1923 - Friday - May 08, 2020 - 6PM Live Broadcast Link: https://youtu.be/ElOioMzaO8I DID COMEY LIE ABOUT FBI ACCESS TO DNC SERVERS? JOHN PODESTA NEVER CALLED LAW ENFORCEMENT 1923-6P One of the transcripts released was the Mueller interview with Perkins Coie attorney Michael Sussmann. Sussmann left the DOJ’s Computer Crime/intellectual Property Section to work with Perkins Coie. Sussmann was hired by the DNC and met with and provided Christopher Steele with claims about Alfa Bank’s alleged ties to Vladimir Putin. DID COMEY LIE ABOUT FBI ACCESS TO DNC SERVERS? JOHN PODESTA NEVER CALLED LAW ENFORCEMENT – The Pete Santilli Show http://ow.ly/QMIF30qEqLg GUEST: Dr. Nick Begich is well known for his work and research on HAARP;"Mind Effects" and more. He has widely reported in these areas as an expert for many publications, government organizations and private companies. He has been an expert witness for the European Parliament on these subjects and provides significant research contributions in this area. Also, through the Lay Institute on Technologies he organized a private meeting of top scientists in the area of mind effects in 2007. Begich has authored five books in seven languages on technology and the impacts of change. Heard on thousands of radio and television talk shows and documentaries, he is a frequent commentator on new technologies, energy, politics, education and the environment. Website: earthpulse.com
Former agent Scott Larson served in the FBI for 13 years. While assigned to the Chicago Division, he was one of the original 13 FBI Laboratory-certified Computer Analysis and Response Team (CART) field examiners. In this episode of FBI Retired Case File Review, Scott reviews the Solar Sunrise case where, as the lead investigator, he tracked cyber intrusions into more than 200 Department of Defense (DoD) computer systems. The highly sensitive international investigation revealed the identities of the culprits responsible for the hacking and data breach of military sites initially thought to be the work of hostile foreign entities. During his Bureau career, Scott Larson participated in dozens of computer forensic searches and exams. As acting chief of the Computer Investigations Unit at FBI headquarters, he served as program manager for FBI’s Computer Investigations and Infrastructure Threat Assessment Program and oversaw computer crime squads and investigations nationwide. As a supervisory special agent in the FBI’s Washington Field Office, he supervised criminal, counterintelligence, and counterterrorism cyber-espionage matters. Scott Larson also taught “Introduction to Computer Crime” and “Network Investigations” training at the FBI Academy. After his resignation, he began working in the private industry and currently operates Larson Security, a firm dedicated to minimizing risks and protecting client assets through cybersecurity, digital forensics, and incident response. To learn more about Scott Larson and his work visit the company’s website larsonsecurity.com. Join my Reader Team to get the FBI Reading Resource - Books about the FBI, written by FBI agents, the 20 clichés about the FBI Reality Checklist, and keep up to date on the FBI in books, TV, and movies via my monthly email. Join here. Jerri Williams, a retired FBI agent, author and podcaster, attempts to relive her glory days by writing and blogging about the FBI and hosting FBI Retired Case File Review, a true crime/history podcast. Her new book FBI Myths and Misconceptions: A Manual for Armchair Detectives provides details everything you need to know about the FBI and her crime novels—Pay To Play and Greedy Givers—inspired by actual true crime FBI cases, are available on Amazon.
Welcome to a new episode of An InfoSec Life on ITSPmagazine! Today’s topic looks at the life of a hacker and the challenges they face from both a liability and legal perspective. We also look at how organizations deal with the research activities they encounter from both cybercriminals and ethical hackers alike. To help me have this conversation, I am delighted to welcome Amit Elazari, Lecturer at UC Berkeley School of Information, and Leonard Bailey, Special Counsel for National Security at the U.S. Department of Justice, Criminal Division where he is Head of Cybersecurity Unit for the DOJ’s Computer Crime & Intellectual Property Section. There are laws to protect companies from cybercriminals. However, those laws— when interpreted as such—also block ethical hackers from researching and looking for exploitable weaknesses. Changes in the acts and laws over the years have made it better, if not easier, for ethical hackers to perform their research and engage in responsible disclosure. The question is: do these changes also make it "better" and/or “easier” for the cybercriminals? “Safe harbor is not a blanket approval of protection from the law." ~ Amit Elazari During our chat, we dig into the many yin yang elements of this topic as we explore some of the details behind responsible disclosure and vulnerability disclosure programs, the related language and frameworks available from the DoJ and Disclose.io, and how those interact with—and often counteract—the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act (DMCA). There’s a lot of work being done to help establish a safe environment for vulnerability research and responsible disclosure to take place. Formal rules surrounding responsible vulnerability are critical in both the legal landscape as well as with ethical business operations—these rules need sorting out quickly if we are going to function in a safe cyber society. Listen in and enjoy! This episode of An InfoSec Life is made possible by the generosity of our sponsors, Devo and STEALTHbits. Click below to learn more about what they can do for you: www.itspmagazine.com/company-directory/devo www.itspmagazine.com/company-directory/stealthbits
Jon describes farm equipment, while Eric teaches driving lessons. Routers around the world are vulnerable, and a critical battle is won for the open web. A fun book tracking hackers and a crazy project for a VGA adapter. Links: What is a flail? - https://en.wikipedia.org/wiki/Flail_mower Oregon Instructional Permit - http://www.oregon.gov/ODOT/DMV/TEEN/pages/permit.aspx Vulnerable GPON Routers - https://threatpost.com/millions-of-home-fiber-routers-vulnerable-to-complete-takeover/131593/ Not a Computer Crime - https://www.eff.org/deeplinks/2018/04/dc-court-accessing-public-information-not-computer-crime Python Environment - https://www.xkcd.com/1987/ The Cuckoo's Egg - https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ Software Defined Radio - https://osmocom.org/projects/osmo-fl2k/wiki/Osmo-fl2k
Are you doing everything you can to stop thieves from stealing your identity and 'porting' your phone number?
There is no way out, one day your child wants to play "Minecraft". Be prepared! There are good books about how to play and about the hot topic "cyberbullying". - Kaum ein Kind wird davor verschont bleiben, irgendwann mit dem Computerspiel „Minecraft“ in Kontakt zu kommen. Darauf kann man es vorbereiten.
Episode four of DCrypted covers what goes into Computer Crime Law, and investigates the law/controversy surrounding passwords and the 5th Amendment. Guest: Laurent Sacharoff Creator/ Host/ Editor/ Writer: Jacob Biesiada Producer/ Co-Host/ Writer: Dayton Williams
In recent months self-proclaimed “cybersecurity experts” have posted cybercrime history timelines in online outlets but left out some of the most significant cases that impacted all subsequent cybercrime cases & laws; the Morris Worm & the German hackers caught by Clifford Stoll. In this episode you will hear from the trailblazer in the computer crime prosecution space, Mark Rasch, & learn what he has seen over the years with regard to computer crime, hacking, what has changed, & the things that have remained the same. Mark created the Computer Crime Unit at the US Department of Justice, where he led efforts aimed at investigating and prosecuting cyber, high-tech, and white-collar crime. Mark helped the FBI and Treasury Department develop their original procedures on handling electronic evidence to use for computer crime prosecutions & has taught digital crime and evidence classes at the FBI Academy and the Federal Law Enforcement Training Center. Tune in for a fascinating discussion!
In this episode... Raf sits down with Howard Shmidt to talk about Cyber Security from the public to private sectors and everything in between. Howard & Raf talk through challenges of cyber security in the board room Howard gives us some of the challenges that government faces, from his experience Don't miss this episode! Guest Howard A. Schmidt ( @HowardAS ) - Former Supervisory Special Agent,Director of Computer Crime and Information Warfare, AF OSI, Former CSO Microsoft Corp. Former Chairman of White House Critical Infrastructure Protection Board, VP, CISO eBay Inc. Special Agent, US Army CID (Reserves). Law Enforcement Officer Chandler Police Department, AZ
The American Institute for CPCU and the Insurance Institute of America, known as "The Instutues," are pleased to continue a series of podcasts focusing on ethics and professional standards for the insurance industry. In this program, a panel of experts discusses issues of computer security and computer crime, and precautions companies should take to combat computer crime. Panelists: - Lori Bailey, Assistant Vice President, Technology Products, AIG National Union - Rich Berthelsen, Director of Content Development at The Institutes, and a risk management expert - Shena Crowe, InfraGuard coordinator with the FBI's San Francisco Field Office Download the podcast here (64.4 mb stereo MP3 file, 46.55 duration). The American Institute for Chartered Property Casualty Underwriters (AICPCU) and the Insurance Institute of America (IIA) are independent, nonprofit organizations offering educational programs and professional certification to people in all segments of the property and liability insurance business. We respond to the educational needs of people in insurance and risk management to help them provide professional service to the public. More than 150,000 insurance practitioners around the world are involved in Institute programs. For more information, visit the website, email cserv@cpcuiia.org, phone (800) 644-2101, or fax (610) 640-9576. Keywords: AICPCU, insurance, The Institutes, risk management,computer crime,data security
The American Institute for CPCU and the Insurance Institute of America, known as "The Instutues," are pleased to continue a series of podcasts focusing on ethics and professional standards for the insurance industry.In this program, a panel of experts discusses issues of computer security and computer crime, and precautions companies should take to combat computer crime. Panelists:- Lori Bailey, Assistant Vice President, Technology Products, AIG National Union- Rich Berthelsen, Director of Content Development at The Institutes, and a risk management expert- Shena Crowe, InfraGuard coordinator with the FBI's San Francisco Field Office Download the podcast here (64.4 mb stereo MP3 file, 46.55 duration).The American Institute for Chartered Property Casualty Underwriters (AICPCU) and the Insurance Institute of America (IIA) are independent, nonprofit organizations offering educational programs and professional certification to people in all segments of the property and liability insurance business. We respond to the educational needs of people in insurance and risk management to help them provide professional service to the public. More than 150,000 insurance practitioners around the world are involved in Institute programs.For more information, visit the website, email cserv@cpcuiia.org, phone (800) 644-2101, or fax (610) 640-9576. Keywords: AICPCU, insurance, The Institutes, risk management,computer crime,data security
As cyber security has evolved in the new world of distributedcomputingthere have been dramatic changes to the nature of our security needs. Mr.Schmidt will talk about issues that affect large enterprises, small andmedium business and end users. He will talk about common threats, and thepossibility of frameworks which would protect ourselves, our civil rightsand our privacy while ensuring improved security. About the speaker: Howard A. Schmidt has had a long distinguished career in defense, law enforcement and corporate security spanning almost 40 years. He has served as Vice President and Chief Information Security Officer and Chief Security Strategist for online auction giant eBay. He most recently served in the position of Chief Security Strategist for the US CERT Partners Program for the National Cyber Security Division, Department of Homeland Security.He retired from the White House after 31 years of public service in local and federal government. He was appointed by President Bush as the Vice Chair of the President's Critical Infrastructure Protection Board and as the Special Adviser for Cyberspace Security for the White House in December 2001. He assumed the role as the Chair in January 2003 until his retirement in May 2003.Prior to the White House, Howard was chief security officer for Microsoft Corp., where his duties included CISO, CSO and forming and directing the Trustworthy Computing Security Strategies Group.Before Microsoft, Mr. Schmidt was a supervisory special agent and director of the Air Force Office of Special Investigations (AFOSI) Computer Forensic Lab and Computer Crime and Information Warfare Division. While there, he established the first dedicated computer forensic lab in the government.Before AFOSI, Mr. Schmidt was with the FBI at the National Drug Intelligence Center, where he headed the Computer Exploitation Team. He is recognized as one of the pioneers in the field of computer forensics and computer evidence collection. Before working at the FBI, Mr. Schmidt was a city police officer from 1983 to 1994 for the Chandler Police Department in Arizona.Mr. Schmidt served with the U.S. Air Force in various roles from 1967 to 1983, both in active duty and in the civil service. He had served in the Arizona Air National Guard from 1989 until 1998 when he transferred to the U.S. Army Reserves as a Special Agent, Criminal Investigation Division where he continues to serve. He has testified as an expert witness in federal and military courts in the areas of computer crime, computer forensics and Internet crime.Mr. Schmidt also serves as the international president of the Information Systems Security Association (ISSA) and was the first president of the Information Technology Information Sharing and Analysis Center (IT-ISAC). He is a former executive board member of the International Organization of Computer Evidence, and served as the co-chairman of the Federal Computer Investigations Committee. He is a member of the American Academy of Forensic Scientists. He had served as a board member for the CyberCrime Advisory Board of the National White Collar Crime Center, and was a distinguished special lecturer at the University of New Haven, Conn., teaching a graduate certificate course in forensic computing.He served as an augmented member to the President's Committee of Advisors on Science and Technology in the formation of an Institute for Information Infrastructure Protection. He has testified before congressional committees on computer security and cyber crime, and has been instrumental in the creation of public and private partnerships and information-sharing initiatives. He is regularly featured on CNN, CNBC, Fox TV as well as a number of local media outlets talking about cyber-security. He is a co-author of the Black Book on Corporate Security and author of "Patrolling CyberSpace, Lessons Learned from a Lifetime in Data Security".Mr. Schmidt has been appointed to the Information Security Privacy Advisory Board (ISPAB) to advise the National Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information security and privacy issues pertaining to Federal Government information systems.Howard holds board positions on a number of corporate boards in both an advisory and director positions and recently has assumed the role as Chairman of the Board for Electronics Lifestyle Integration (ELI).Mr. Schmidt holds a bachelor's degree in business administration (BSBA) and a master's degree in organizational management (MAOM) from the University of Phoenix. He also holds an Honorary Doctorate degree in Humane Letters. Howard is a Professor of Practice at GA Tech, GTISC, Professor of Research at Idaho State University and Adjunct Senior Fellow with Carnegie Mellon's CyLab.
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws