"The "Smart" Fourth Amendment", article by Andrew Guthrie Ferguson, Cornell Law Review, Vol.102, pp.547-632, 2017. "This Article addresses the question of how the Fourth
Amendment should protect “smart data.” It exposes the growing
danger of sensor surveillance and the weakness of current
Fourth Amendment doctrine. The Article then suggests a new
theory of “informational curtilage” to protect the data trails
emerging from smart devices and reclaims the principle of
“informational security” as the organizing framework for a
digital Fourth Amendment."
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Thursday, April 27, 2017
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources - CRS Report
"Cybersecurity: Critical Infrastructure Authoritative Reports and Resources", by Rita Tehan - CRS Report. April 21, 2017, 43 pages. This document provides a lot of information about critical infrastructures in the U.S (through a sectorial presentation: energy, financial industry, health, telecommunications, transports), and their vulnerabilities to cyber operations (for instance, let's notice that "U.S. critical infrastructure systems experienced a 20% increase in
attempted cybersecurity breaches in FY2015, ICS-CERT responded
to 295 cybersecurity incidents involving critical infrastructure,
compared with 245 in fiscal 2014").
Symantec - Internet Security Threat Report. Vol. 22
Symantec - Internet Security Threat Report. Vol. 22, April 2017, 77 pages.
"The Symantec Global Intelligence Network
tracks over 700,000 global adversaries and records
events from 98 million attack sensors worldwide.
This network monitors threat activities in over 157
countries and territories through a combination
of Symantec products, technologies, and services,
including Symantec Endpoint Protection™, Symantec
DeepSight™ Intelligence, Symantec Managed
Security Services™, Norton™ consumer products,
and other third-party data sources, generating
more than nine trillion rows of security data... " Download the report.
Hacking Back – Offense/Defense in Enterprise IT Security
"Hacking Back – Offense/Defense in Enterprise IT Security", by Edgar Hurtado Jr, East Carolina University ICTN-4040: Enterprise Information Security, April 2017, 9 pages.
IISS Cyber Report: 13 to 19 April, 2017
"IISS Cyber Report: 13 to 19 April", 2017. This online report is a weekly digest of the world's cyber security news.
A Tech Accord to protect people in cyberspace
"A Tech Accord to protect people in cyberspace", Microsoft Policy Papers, April 2017.
"People need to trust technology, the makers of technology, and cyberspace itself" [...] "The government and the technology industry must partner on cybersecurity".
Microsoft suggests to share responsibilities in the governance of cybersecurity between private and state actors.
A Digital Geneva Convention to protect cyberspace
"A Digital Geneva Convention to protect cyberspace", Microsoft Policy Papers, April 2017.
"Governments continue to invest in greater offensive capabilities in cyberspace, and nation-state attacks
on civilians are on the rise" [...] "A Digital Geneva Convention would create a legally binding framework to govern states’ behavior in
cyberspace".
Subscribe to:
Posts (Atom)