POPULARITY
Ready to demystify the world of digital evidence in cybersecurity? What if you could easily navigate the complex protocols that safeguard system logs, network logs, and files? This episode promises to enhance your understanding of digital evidence, and its undeniable fragility. We deep-dive into why maintaining the chain of custody matters and the key to ensuring the integrity of these critical pieces of information.Ever thought about the art and science of digital forensics? We break it down, from data collection that leaves the original form untouched, to the vital role of analysis in reconstructing incidents. We share insights on creating comprehensive reports for all audiences, and the best practices for presenting findings to all relevant parties. Listen in as we guide you through the four key phases of digital forensics: acquisition, analysis, reporting, and presentation.But that's not all. We also delve into the legal and ethical minefield of digital evidence collection. We dissect the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, Data Breach Notification Laws, and the importance of Chain of Custody. We expose how these considerations play out in real-world scenarios. Towards the end, we focus on the significance of digital evidence in CISSP domain seven, seven dot one, and offer free resources to help you ace your CISSP exam. Make sure you've got your pen and paper ready for this information-packed episode.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Our brother was not able to make it, but we spoke a word over the airwaves today. Keep in mind, this is for informational purposes only and the opinions, thoughts, expressions, and information is made solely on behalf of the living who reserve all rights without prejudice. In this episode, we explore some of the founding principles of Nature's God and the men who autographed the Declaration of Independence. We take a dive into one of the Amendments of the Consitution, which is the agreement that the In Fact Government has with the People. The resources are below, please enjoy! The 13th Amendent: https://constitution.congress.gov/browse/amendment-13/ Declaration of Independence: https://www.archives.gov/founding-docs/declaration-transcript Law of 1664 Maryland: https://msa.maryland.gov/msa/speccol/sc5300/sc5348/html/chap4.html Loss of nationality by native-born or naturalized citizen; voluntary action; burden of proof; presumptions: https://www.law.cornell.edu/uscode/text/8/1481 Support our Special Guests living on the streets of downtown Phoenix: gofundme.com/PresentGod Your Road To Freedom: https://docs.google.com/document/d/1hSwsp6AMfyVZiHtBhTRJSuNNCN5cjiz5/edit?usp=drivesdk&ouid=108104927172440397758&rtpof=true&sd=true All rights reserved without prejudice. American Secured Party Creditor Confidentiality Notice: Private: This is Not A Public Communication! This private video, including any/all document(s), is lawfully protected [~Electronic Communications Privacy Act, 18 U.S.A. §§ 2510-2521]To all public servants, including but not limited to Federal, State, or Local corporate government(s): I accept your oath of office as your firm and binding contract between you and me, one of the People, whereby you have promised to serve, protect, and defend me, guarantee the protection, and upholding of all of my unalienable rights, and inalienable rights, and defend the Constitution for the united States of America, and any/all subservient Constitution(s) thereto. Whatever is authored by Me is copy protected and remains as My property. Access, disclosure, distribution, copying of and/or copying by any means by any device or retrieval systems is prohibited without the explicit written permission of the author. Reliance on any of it by anyone without doing further research, proving, having proof, or verifying is prohibited. Violations, infringements, and or offenses may result in civil and or criminal actions, and/or tried by common law. Please delete if obtained in error and email confirmation to the sender. With explicit reservation of all My rights, without prejudice and without recourse to Me or to any of My rights. Any omission does not constitute a waiver of any and/or all intellectual property rights or reserved rights. Notice To Agents Is Notice To Principals, Notice To Principals Is Notice To Agents! #Constitution #USCode #Bible #Maritime #ModernDaySlavery #13thAmendment #14thAmendment #Rights #Liberty #DeclarationofIndependence #1776 --- Send in a voice message: https://podcasters.spotify.com/pod/show/moderndayslave/message Support this podcast: https://podcasters.spotify.com/pod/show/moderndayslave/support
the Sustainer Holotropic HussyJessica Jolie Badonsky is a board-certified Family Nurse Practitioner with 18 years of experience in the wellness space. For the last 10+ years, Jessica's focus has been as an intimacy and erotica coach, where many of her clients start with from the point of sex and find their full expression of power in all aspects of their lives. Jessica is a holotropic practitioner, which means that she considers all parts of her clients, and creates a container to not only move toward change but embody a greater sense of self. Jessica is a parent of 3 amazing children, partner of a veteran, and constant student of emotional intelligence, sex, sexuality, intimacy, science, wellness, consciousness, psychedelics, and movement. Jessica J. Badonsky, MSN, FNP-BCJessica Jolie Badonsky NP Family Health PLLCPrivate Parts of Wellnessprivatepartsofwellness.com917-821-1767 (call and text) "So be it! See to it!" Octavia ButlerFor supplements check out https://wellevate.me/jessica-badonskyDr. Damaris G. is an Integrative Doctor of Nurse Practice Family Nurse Practioner Mom, Veteran,. BC Family Nurse Practioner & Holistic Integrative health, Studies Functional MedicineSocial Media
I was giving a talk at DefCon one year and this guy starts grilling me at the end of the talk about the techniques Apple was using to encrypt home directories at the time with new technology called Filevault. It went on a bit, so I did that thing you sometimes have to do when it's time to get off stage and told him we'd chat after. And of course he came up - and I realized he was really getting at the mechanism used to decrypt and the black box around decryption. He knew way more than I did about encryption so I asked him who he was. When he told me, I was stunned. Turns out that like me, he enjoyed listening to A Prairie Home Companion. And on that show, Garrison Keillor would occasionally talk about Ralph's Pretty Good Grocery in a typical Minnesota hometown he'd made up for himself called Lake Wobegon. Zimmerman liked the name and so called his new encryption tool PGP, short for Pretty Good Privacy. It was originally written to encrypt messages being sent to bulletin boards. That original tool didn't require any special license, provided it wasn't being used commercially. And today, much to the chagrin of the US government at the time, it's been used all over the world to encrypt emails, text files, text messages, directories, and even disks. But we'll get to that in a bit. Zimmerman had worked for the Nuclear Weapons Freeze Campaign in the 80s after getting a degree in computer science fro Florida Atlantic University in 1978. And after seeing the government infiltrate organizations organizing Vietnam protests, he wanted to protect the increasingly electronic communications of anti-nuclear protests and activities. The world was just beginning to wake up to a globally connected Internet. And the ARPAnet had originally been established by the military industrial complex, so it was understandable that he'd want to keep messages private that just happened to be flowing over a communications medium that many in the defense industry knew well. So he started developing his own encryption algorithm called BassOmatic in 1988. That cipher used symmetric keys with control bits and pseudorandom number generation as a seed - resulting in 8 permutation tables. He named BassOmatic after a Saturday Night Live skit. I like him more and more. He'd replace BassOmatic with IDEA in version 2 in 1992. And thus began the web of trust, which survives to this day in PGP, OpenPGP, and GnuPG. Here, a message is considered authentic based on it being bound to a public key - one that is issued in a decentralized model where a certificate authority issues a public and private key where messages can only be encrypted or signed with the private key and back then you would show your ID to someone at a key signing event or party in order to get a key. Public keys could then be used to check that the individual you thought was the signer really is. Once verified then a separate key could be used to encrypt messages between the parties. But by then, there was a problem. The US government began a criminal investigation against Zimmerman in 1993. You see, the encryption used in PGP was too good. Anything over a 40 bit encryption key was subject to US export regulations as a munition. Remember, the Cold War. Because PGP used 128 bit keys at a minimum. So Zimmerman did something that the government wasn't expecting. Something that would make him a legend. He went to MIT Press and published the PGP source code in a physical book. Now, you could OCR the software, run it through a compiler. Suddenly, his code was protected as an exportable book by the First Amendment. The government dropped the investigation and found something better to do with their time. And from then on, source code for cryptographic software became an enabler of free speech, which has been held up repeatedly in the appellate courts. So 1996 comes along and PGP 3 is finally available. This is when Zimmerman founds PGP as a company so they could focus on PGP full-time. Due to a merger with Viacrypt they jumped to PGP 5 in 1997. Towards the end of 1997 Network Associates acquired PGP and they expanded to add things like intrusion detection, full disk encryption, and even firewalls. Under Network Associates they stopped publishing their source code and Zimmerman left in 2001. Network Associates couldn't really find the right paradigm and so merged some products together and what was PGP commandline ended up becoming McAfee E-Business Server in 2013. But by 2002 PGP Corporation was born out of a few employees securing funding from Rob Theis to help start the company and buy the rest of the PGP assets from Network Associates. They managed to grow it enough to sell it for $300 million to Symantec and PGP lives on to this day. But I never felt like they were in it just for the money. The money came from a centralized policy server that could do things like escrow keys. But for that core feature of encrypting emails and later disks, I really always felt like they wanted a lot of that free. And you can buy Symantec Encryption Desktop and command it from a server, S/MIME and OpenPGP live on in ways that real humans can encrypt their communications, some of which in areas where their messages might get them thrown in jail. By the mid-90s, mail wasn't just about the text in a message. It was more. RFC934 in 1985 had started the idea of encapsulating messages so you could get metadata. RFC 1521 in 1993 formalized MIME and by 1996, MIME was getting really mature in RFC2045. But by 1999 we wanted more and so S/MIME went out as RFC 2633. Here, we could use CMS to “cryptographically enhance” a MIME body. In other words, we could suddenly encrypt more than the text of an email and it since it was an accepted internet standard, it could be encrypted and decrypted with standard mail clients rather than just with a PGP client that didn't have all the bells and whistles of pretty email clients. That included signing information, which by 2004 would evolve to include attributes for things like singingTime, SMIMECapabilities, algorithms and more. Today, iOS can use S/MIME and keys can be stored in Exchange or Office 365 and that's compatible with any other mail client that has S/MIME support, making it easier than ever to get certificates, sign messages, and encrypt messages. Much of what PGP was meant for is also available in OpenPGP. OpenPGP is defined by the OpenPGP Working Group and you can see the names of some of these guardians of privacy in RFC 4880 from 2007. Names like J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. Despite the corporate acquisitions, the money, the reprioritization of projects, these people saw fit to put powerful encryption into the hands of real humans and once that pandoras box had been opened and the first amendment was protecting that encryption as free speech, to keep it that way. Use Apple Mail, GPGTools puts all of this in your hands. Use Android, get FairEmail. Use Windows, grab EverDesk. This specific entry felt a little timely. Occasionally I hear senators tell companies they need to leave backdoors in products so the government can decrypt messages. And a terrorist forces us to rethink that basic idea of whether software that enables encryption is protected by freedom of speech. Or we choose to attempt to ban a company like WeChat, testing whether foreign entities who publish encryption software are also protected. Especially when you consider whether Tencent is harvesting user data or if the idea they are doing that is propaganda. For now, US courts have halted a ban on WeChat. Whether it lasts is one of the more intriguing things I'm personally watching these days, despite whatever partisan rhetoric gets spewed from either side of the isle, simply for the refinement to the legal interpretation that to me began back in 1993. After over 25 years we still continue to evolve our understanding of what truly open and peer reviewed cryptography being in the hands of all of us actually means to society. The inspiration for this episode was a debate I got into about whether the framers of the US Constitution would have considered encryption, especially in the form of open source public and private key encryption, to be free speech. And it's worth mentioning that Washington, Franklin, Hamilton, Adams, and Madison all used ciphers to keep their communications private. And for good reason as they knew what could happen should their communications be leaked, given that Franklin had actually leaked private communications when he was the postmaster general. Jefferson even developed his own wheel cipher, which was similar to the one the US army used in 1922. It comes down to privacy. The Constitution does not specifically call out privacy; however, the first Amendment guarantees the privacy of belief, the third, the privacy of home, the fourth, privacy against unreasonable search and the fifth, privacy of of personal information in the form of the privilege against self-incrimination. And giving away a private key is potentially self-incrimination. Further, the ninth Amendment has broadly been defined as the protection of privacy. So yes, it is safe to assume they would have supported the transmission of encrypted information and therefore the cipher used to encrypt to be a freedom. Arguably the contents of our phones are synonymous with the contents of our homes though - and if you can have a warrant for one, you could have a warrant for both. Difference is you have to physically come to my home to search it - whereas a foreign government with the same keys might be able to decrypt other data. Potentially without someone knowing what happened. The Electronic Communications Privacy Act of 1986 helped with protections but with more and more data residing in the cloud - or as with our mobile devices synchronized with the cloud, and with the intermingling of potentially harmful data about people around the globe potentially residing (or potentially being analyzed) by people in countries that might not share the same ethics, it's becoming increasingly difficult to know what is the difference between keeping our information private, which the framers would likely have supported and keeping people safe. Jurisprudence has never kept up with the speed of technological progress, but I'm pretty sure that Jefferson would have liked to have shared a glass of his favorite drink, wine, with Zimmerman. Just as I'm pretty sure I'd like to share a glass of wine with either of them. At Defcon or elsewhere!
https://www.youtube.com/channel/UCzNraRZlzhG24rzTyazSWaA?view_as=subscriber Broadcasted locally From KDWN News Talk Radio 101.5 FM and on Iheart Radio. Dan French-A Southern CA transplant, Dan has over 11 years in home financing with a multi-faceted background in lending. Dan has the main objective of providing the highest level of customer service and be available to answer technical questions throughout all loan transactions. I provide step by step instructions and communication until the transaction is complete. I have been apart of a team that has been in the top 1% originators in 2013-2015 and I understand the level of commitment needed while providing the 5-star one-on-one service each of my clients receives. Dan French VP of Mortgage Lending dan.french@rate.com www.rate.com O: (702) 214-1019 - F: (872) 808-1465 9121 W. Russell Road Suite 210, Las Vegas, NV 89148 Loan Options - Mobile App - Guaranteed Rate Foundation - Gateless | © Guaranteed Rate 2019 | 3940 N. Ravenswood Ave., Chicago, IL. 60613 NMLS ID 2611 / NMLS Consumer Access / Licensing Information Please Note: We care about your security and privacy. Please don't include identifying information like account numbers, birth dates and social security numbers in emails to us. Call us instead for secure email options or send the information by fax or regular US mail. CONFIDENTIALITY AND SECURITY NOTICE The contents of this message and any attachments may be privileged, confidential and proprietary and also may be covered by the Electronic Communications Privacy Act. If you are not an intended recipient, please inform the sender of the transmission error and delete this message immediately without reading, disseminating, distributing or copying the contents. Guaranteed Rate makes no assurances that this e-mail and any attachments are free of viruses and other harmful code.
https://www.youtube.com/channel/UCzNraRZlzhG24rzTyazSWaA?view_as=subscriber Broadcasted Locally From 101.5 FM KDWN News Talk Radio and on Iheart Radio. Dan French- A Southern CA transplant, Dan has over 11 years in home financing with a multi-faceted background in lending. Dan has the main objective of providing the highest level of customer service and be available to answer technical questions throughout all loan transactions. I provide step by step instructions and communication until the transaction is complete. I have been apart of a team that has been in the top 1% originators in 2013-2015 and I understand the level of commitment needed while providing the 5-star one-on-one service each of my clients receives. Dan French VP of Mortgage Lending dan.french@rate.com NMLS# 369115 www.rate.com O: (702) 214-1019 - F: (872) 808-1465 9121 W. Russell Road Suite 210, Las Vegas, NV 89148 Loan Options - Mobile App - Guaranteed Rate Foundation - Gateless | © Guaranteed Rate 2019 | 3940 N. Ravenswood Ave., Chicago, IL. 60613 NMLS ID 2611 / NMLS Consumer Access / Licensing Information Please Note: We care about your security and privacy. Please don't include identifying information like account numbers, birth dates and social security numbers in emails to us. Call us instead for secure email options or send the information by fax or regular US mail. CONFIDENTIALITY AND SECURITY NOTICE The contents of this message and any attachments may be privileged, confidential and proprietary and also may be covered by the Electronic Communications Privacy Act. If you are not an intended recipient, please inform the sender of the transmission error and delete this message immediately without reading, disseminating, distributing or copying the contents. Guaranteed Rate makes no assurances that this e-mail and any attachments are free of viruses and other harmful code.
Life in Las Vegas Buying A Home. Dan French VP of Mortgage Lending dan.french@rate.com NMLS#369115 www.rate.com O: (702) 214-1019 - F: (872) 808-1465 9121 W. Russell Road Suite 210, Las Vegas, NV 89148 Loan Options - Mobile App - Guaranteed Rate Foundation - Gateless | © Guaranteed Rate 2019 | 3940 N. Ravenswood Ave., Chicago, IL. 60613 NMLS ID 2611 / NMLS Consumer Access / Licensing Information Please Note: We care about your security and privacy. Please don't include identifying information like account numbers, birth dates and social security numbers in emails to us. Call us instead for secure email options or send the information by fax or regular US mail. CONFIDENTIALITY AND SECURITY NOTICE The contents of this message and any attachments may be privileged, confidential and proprietary and also may be covered by the Electronic Communications Privacy Act. If you are not an intended recipient, please inform the sender of the transmission error and delete this message immediately without reading, disseminating, distributing or copying the contents. Guaranteed Rate makes no assurances that this e-mail and any attachments are free of viruses and other harmful code.
Helen Nissenbaum (@HNissenbaum) is on the faculty if Cornell Tech, on leave from NYU where she Professor of Media, Culture and Communication and Director of the Information Law Institute. Her eight books include Obfuscation: A User's Guide for Privacy and Protest, with Finn Brunton (MIT Press, 2015), Values at Play in Digital Games, with Mary Flanagan (MIT Press, 2014), and Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford, 2010). Her research has been published in journals of philosophy, politics, law, media studies, information studies, and computer science. Grants from the National Science Foundation, Air Force Office of Scientific Research, and the U.S. Department of Health and Human Services Office of the National Coordinator have supported her work on privacy, trust online, and security, as well as studies of values embodied in design, search engines, digital games, facial recognition technology, and health information systems. Recipient of the 2014 Barwise Prize of the American Philosophical Association, Prof. Nissenbaum has contributed to privacy-enhancing software, including TrackMeNot (for protecting against profiling based on Web search) and AdNauseam (protecting against profiling based on ad clicks). Both are free and freely available. Nissenbaum holds a Ph.D. in philosophy from Stanford University and a B.A. (Hons) from the University of the Witwatersrand. Before joining the faculty at NYU, she served as Associate Director of the Center for Human Values at Princeton University. In this episode, we discussed: the commercial and political contexts that animate policy discussion around privacy. the means by which citizens may use technology to obfuscate their lawful online activity and activism. points of alignment between consumer privacy advocates and the tech sector. policy recommendations. Resources: Cornell Tech NYU Steinhardt Department of Media, Culture and Communication Obfuscation: A User's Guide for Privacy and Protest by Finn Brunton and Helen Nissenbaum (MIT, 2016) The Crooked Timber of Humanity by Isaiah Berlin (Princeton, 2013) Ad Nauseum TrackMeNot NEWS ROUNDUP Republican California Representative David Nunes, who is Chairman of the House Intelligence Committee, which has been investigating Russia's role in the 2016 election, has said he'd like to know why the FBI recorded former national security advisor Michael Flynn's conversations with the Russian ambassador in the first place. He said it was an invasion of Flynn's privacy. Trump forced Flynn to resign two weeks ago, after it was revealed that Flynn misled Vice President Mike Pence about Flynn's contacts with Russian officials days before the election. Trump himself did not inform Pence about Flynn's conversations until at least 2 weeks after Trump knew about them, according to the Washington Post. House Oversight Committee Chairman Jason Chafetz also said his committee had no plans to conduct a further investigation. Mike Debonis has the story in the Washington Post. Politico reports that conservatives worried about leaks from federal employees have asked federal agencies to look into employees' use of the encrypted data app Signal. -- Amidst intense competition from T-Mobile and Sprint which have long offered unlimited data plans, Verizon will now itself offer unlimited data once again. Verizon had stopped offering unlimited data in 2011. -- The Chief of Samsung Group was arrested last week in South Korea. Forty-eight year old Jay Y. Lee, a member of South Korea's richest family, is accused bribing individuals connected with South Korean President Park Geun Hye, who was impeached in December on corruption charges. Hyunjoo Jin and Joyce Lee cover this in Reuters. -- Amid increased cyber warfare, Microsoft President Brad Smith is calling for a "digital Geneva Convention". At the RSA security conference last week, Smith noted “Let's face it, cyberspace is the new battlefield." Smith said the convention should define rules of engagement, such as rules under which nation's would pledge not to disrupt civilian infrastructure. Elizabeth Weise covers this in USA Today. -- Facebook CEO Mark Zuckerberg published a 5,800 word missive last week in which he took a stand in support of globalization and Facebook's role in it. The wave of nationalism that has swept the Western world has prompted a debate about the merits of globalization. Mike Isaac has the story in The New York Times. -- Snapchat set its valuation between $19.5 and $22 billion ahead of its long-anticipated IPO. In that range, it would be the largest IPO since Alibaba's in 2014. -- At the RSA conference last week, Assistant FBI Director Scott Smith said the federal law enforcement agency will be ramping up its use of predictive policing technology. Smith said, "It's where we are moving, and hope to go when you talk about predicting as opposed to proactive and reactive. Reactive is consistently where we have been, proactive means we're really trying to get ahead of it. But predictive is where we want to be. And that's where I know FBI Cyber Division is strongly moving towards as we speak ..." Catch Chris Bing's full story is in FedScoop. -- Finally, Senator Orrin Hatch--Utah Republican and head of the Republican High Tech Task Force--offered up his tech agenda last week. The agenda targets H1B visa reform and improving cross-border digital trade. Hatch also supports the Electronic Communications Privacy Act, which passed the House earlier this month, which would require law enforcement officials to obtain search warrants for emails. Hatch's plan was praised by tech sector leaders, including Consumer Technology Association president Gary Shapiro. Alexis Kramer has more at Bloomberg BNA.
The Bandrew Says Podcast is available on: ►iTunes: https://itunes.apple.com/us/podcast/bandrew-says-podcast-audio/id1046423132?mt=2 ►Google Play Music: https://play.google.com/music/m/Ieua25h7tadlb2ti4p5nclqhjuu?t=The_Bandrew_Says_Podcast_Audio_Video__Tech ►RSS Feed: http://bandrewsays.libsyn.com 00:00 - Intro 01:05 - Something New For the Podcast 01:53 - Different Theme Song? 02:30 - Removing All My Information from Facebook 04:44 - YouTube Live Streaming 07:09 - 4k WebCam 09:33 - Verizon Unlimited Plan 10:48 - Correction Re: FBI Collecting E-mails from Google 12:22 - Police Scouring Social Media for Evidence 15:30 - Vizio Tracking Users Viewing Habits & IP Address 17:55 - Update to Electronic Communications Privacy Act 20:37 - FBI No Longer Accepting FOIA Requests Via Email 23:00 - TV Announcements 24:41 - Recommended YouTuber 25:32 - Recommended Music 26:31 - Updated Thoughts on Signal 27:22 - Leef RSS Aggregator 29:18 - Outro On episode 55 of the BSP, I start by explaining the second camera angle used in this episode. Let me know in the youtube comments or on twitter if you think I should continue to add a second angle. Then I explain my journey in removing all my information from Facebook. In news, I cover youtube rolling out live streaming from mobile devices, Logitech’s new 4k webcam, Verizon’s new unlimited plan, Police using social media to convict rioters, Vizio tracking users and selling their data, an update the the Electronic Communications Privacy Act, and change to FOIA requests. Following the news, I talk about 3 TV show release dates that I am anxiously awaiting, and suggest I Fight Dragons The Near Future, and iDubbbzTV’s youtube channel. Lastly, I update my thoughts on Signal and share my thoughts on Leef RSS Aggregator. Follow us on: ► Facebook: http://www.facebook.com/bandrewsayspodcast ► Twitter: http://www.twitter.com/bandrewsays ► Website: http://www.geeksrising.com
Nicole Reitz-Larsen (@reitzlarsen) is a secondary classroom teacher with 15+ years teaching experience. She has taught everything from AP/IB Computer Science, to German, Multimedia and Business related courses. She loves working with students and is passionate about equity in education and providing opportunities for all students to be successful. She works with teachers nationwide on the CS10K.org site and with Code.org to promote the importance of computer science, assist districts in implementing computer science K-12 in schools to broaden participation of underrepresented students of color and females. You can often find her facilitating Computer Science workshops nationwide, presenting at teacher conferences or meet ups because she loves working with educators to provide them with resources, and teaching strategies around equity and inquiry, while creating an environment that is inclusive of all students, as well as in the classroom which she calls home. In this episode, we discussed: the key challenges students face in the computer science classroom and best practices for helping them overcome them. tools parents can use to help their kids learn computer science. Resources: Code.org CS10K Made with Code Scratch Nonviolent Communication by Marshall B. Rosenberg NEWS Anonymous hackers some experts believe have Russian ties released a trove of tools the National Security Agency uses to exploit bugs on the Internet to conduct spying operations. For years, the NSA has resisted efforts by institutions to reveal the bugs it was exploiting so they could be fixed. Now, those bugs are on full display for all the world to see. Ellen Nakashima covers this story at the Washington Post and Andy Greenberg is covering it for Wired.----Hackers believed to have Russian ties also got into billionaire George Soros and his Open Society Foundations' files last week, according to Julian Hattem at the Hill. Two thousand documents were released giving an inside look into how the powerful Democratic supporter and his Foundations operate. ---- Google isn't out of the woods yet regarding the way it scans emails to serve up ads. Google scans not just Gmail messages, but also anyone interacting with Gmail, from any domain. The plaintiffs sued Google in the Northern District of California alleging that the company's email scanning practices violate wiretapping provisions of both the Electronic Communications Privacy Act and California's own state privacy laws. Google argued the practice is within the ordinary course of business. But US District Judge Lucy Koh disagreed, ordering the case to move forward. Joe Mullin covers this for Ars Technica.----It looks like internet service providers are going to have to start putting some of its users on blast for copyright infringement-even before they have been convicted of it. The U.S. District Court for the Eastern District of Virginia ruled last week that Cox must pay $25 million to BMG Music for failing to notify users that they had infringed music copyrights by participating in illegal file sharing. BMG enlisted a 3rd party to monitor Cox' users for infringement and when it found infringement, notified Cox. But Cox then prevented its users from receiving notifications. So the court ruled Cox now owes BMG a $25 million penalty. Brian Fung has that story at the Washington Post. ---- Univision has won the bid for Gawker Media's bankruptcy assets. Gawker announced last week it would be ceasing operations. The announcement was made after months of speculation about the fate of the company, following a devastating $140 million judgment against Gawker in favor of Hulk Hogan. Hulk Hogan sued Gawker for posting a video showing Hogan having sex with radio Bubba the Love Sponge's wife. Keepin it classy, baby! Anyway, Univision's bid for Gawker's assets was $135 million, pending approval by the Bankruptcy Court. Lukas Alpert has the story in the Wall Street Journal.----Finally, The DOJ and FTC are seeking comment on proposed rules to update the guidelines we use to license intellectual property. The comments are due September 26th.
A unanimous Supreme Court recently declared that that our networked mobile devices merit the highest level of Fourth Amendment protection against government searches, since these devices often contain more sensitive information than even “the most exhaustive search of a house” would reveal. Yet increasingly, the vast troves of personal data they contain are synched to "the cloud,” where the outdated Electronic Communications Privacy Act of 1986 allows many types of information to be accessed without a warrant. The need to bring the law up to date has been recognized not only by privacy advocates, but major technology companies, more than half of the House of Representatives, and even federal law enforcement officials. Join us for a lively discussion of how and why to drag federal privacy law into the 21st century, with keynote remarks by Rep. Ted Poe (R-TX) and a panel discussion featuring both policy experts and representatives of the tech firms we increasingly entrust with our most private data. See acast.com/privacy for privacy and opt-out information.
Professor Kerr discusses his article, “The Next Generation Privacy Act,” which has been accepted for publication in the University of Pennsylvania Law Review. He argues that Congress should repeal the Electronic Communications Privacy Act of 1986 (18 USC 2510), which regulates government access to Internet records replacing it with a new statute that reflects current technologies and addresses privacy threats. Speaker Biography: Professor Kerr was appointed in May 2012 as Scholar-In-Residence for the program. He is a tenured professor of law at George Washington University, where he teaches criminal law, criminal procedure and computer-crime law. The focus of his academic research has been on how new technologies change criminal law and criminal investigations. Professor Kerr’s work in this area has been cited in more than 70 judicial decisions, including the U.S. Supreme Court’s January 2012 decision in United States v. Jones, on the constitutionality of the warrantless use of GPS monitoring. Kerr’s articles have been published in many leading law reviews, including the Harvard Law Review and the Yale Law Journal. For transcript, captions, and more information, visit http://www.loc.gov/today/cyberlc/feature_wdesc.php?rec=6016
Orin Kerr argues that Congress should repeal the Electronic Communications Privacy Act of 1986 (18 USC 2510), which regulates government access to Internet records, and replace it with a new statute that reflects current technologies and addresses privacy threats. Speaker Biography: Orin S. Kerr is a tenured professor of law at George Washington University, where he teaches criminal law, criminal procedure and computer-crime law. The focus of his academic research has been on how new technologies change criminal law and criminal investigations. Kerr's work in this area has been cited in more than 70 judicial decisions, including the U.S. Supreme Court's January 2012 decision in United States v. Jones, on the constitutionality of the warrantless use of GPS monitoring. Kerr's articles have been published in many leading law reviews, including the Harvard Law Review and the Yale Law Journal. For more information, captions and transcripts, visit http://www.loc.gov/today/cyberlc/feature_wdesc.php?rec=6016
The outdated 1986 Electronic Communications Privacy Act considers e-mail "abandoned" and searchable if it's stored for more than 180 days on a server. Larry Greenemeier reports
Phone authentication on Craigslist, burning an ISO file, Profiles in IT (Umar Saif, Pakistani IT entrepreneur), Great Tech War of 2012 (Apple, Amazon, Facebook, Google, who will control advertising and content delivery, who will be the next Jobs), Stratford to open campus in Baltimore (Baltimore City Council offers support), Ask Siri anything (Apples new voice recognition program Siri, sexy and smart, ask her anything), Google and Facebook lobby to replace Electronic Communications Privacy Act of 1986 (new law needs to address cloud storage and smart phone position tracking), battle of the bots (latest botnet TDL4 loads before OS, very sophisticated rootkit, antivirus companies take note), and Jobs criticized Obama at Silicon Valley dinner (complained about teachers unions and Obama anti-business attitude). This show originally aired on Saturday, October 22, 2011, at 9:00 AM EST on WFED (1500 AM).
Phone authentication on Craigslist, burning an ISO file, Profiles in IT (Umar Saif, Pakistani IT entrepreneur), Great Tech War of 2012 (Apple, Amazon, Facebook, Google, who will control advertising and content delivery, who will be the next Jobs), Stratford to open campus in Baltimore (Baltimore City Council offers support), Ask Siri anything (Apples new voice recognition program Siri, sexy and smart, ask her anything), Google and Facebook lobby to replace Electronic Communications Privacy Act of 1986 (new law needs to address cloud storage and smart phone position tracking), battle of the bots (latest botnet TDL4 loads before OS, very sophisticated rootkit, antivirus companies take note), and Jobs criticized Obama at Silicon Valley dinner (complained about teachers unions and Obama anti-business attitude). This show originally aired on Saturday, October 22, 2011, at 9:00 AM EST on WFED (1500 AM).
Tablet shoot off (iPad2 vs Amazon Fire vs Samsung Galaxy), thumb drives (limitations, data recovery), Profiles in IT (Michael Ralph Stonebraker, database pioneer and serial entrepreneur), backup options for your computer (Carbonite, Mozy, SugarSync), wireless carriers retain personal data (call logs, text logs, IP connections, location through tower connections), digital due process (Electronic Communications Privacy Act needs revision, online data storage must be protected via warrant requirement), and Solar Decathlon 2011 (20 collegiate teams compete to produce the best solar house, Maryland leads the pack). This show originally aired on Saturday, October 1, 2011, at 9:00 AM EST on WFED (1500 AM).
Tablet shoot off (iPad2 vs Amazon Fire vs Samsung Galaxy), thumb drives (limitations, data recovery), Profiles in IT (Michael Ralph Stonebraker, database pioneer and serial entrepreneur), backup options for your computer (Carbonite, Mozy, SugarSync), wireless carriers retain personal data (call logs, text logs, IP connections, location through tower connections), digital due process (Electronic Communications Privacy Act needs revision, online data storage must be protected via warrant requirement), and Solar Decathlon 2011 (20 collegiate teams compete to produce the best solar house, Maryland leads the pack). This show originally aired on Saturday, October 1, 2011, at 9:00 AM EST on WFED (1500 AM).
Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation, will discuss recent cases he has litigated involving the Electronic Communications Privacy Act--the decades--old law that regulates electronic communications privacy—and EFFs efforts as part of the Digital Due Process Coalition to update that law for the 21st century. Susan Freiwald, Professor of Law at University of San Francisco School of Law, will focus on the constitutional tensions underlying these current debates over online and wireless communications privacy, with a special focus on her work defending the locational privacy of cell phone users and privacy in stored email.