About Over 50 Articles Library
Content: Services - Computer
Computer Security No 35: EU court slams indiscriminate data collection opening challenge to British cyber law
Corporate - Private Computer Security
EU court slams indiscriminate data collection opening challenge to British cyber law
(The law requires telecommunication companies to store the web and message history of Britons for the government to access)
1. Australia passed the Data Retention Bill in 2014
2. In Australia, The Tellectommunications (Interception and Access) Act 1979 requires companies to retain a particular set of data for at least 2 years
All information about the Australian law is at:
Britain also passed the Data Retention and Investigation Powers Act in 2014
Europe's highest court, the European Court of Justice in Luxembourg, ruled such a law is unjustiafiable in a democratic society.
This is a massive defeat to Britain's new cyber surveillance law which requires telecommunication companies to keep records and web activity of Britons for one year.
The 15-judge panel found it unlawful for European governments to force communication companies to retain all user daata, thus challenging Britain's Investigatory Powers Act, which gave such access to a range of departments.
In its summary ruling, the Luxembourg court found electronic communications allow “very precise conclusions to be drawn concerning the private lives of persons whose data has been retained,” as The Guardian reported.
To read more:- www.csmonitor.com
The story of an election hack (NY Times)
American intelligence officials said they believed that the hackers were associated with two Russian intelligence agencies.
Federal Security Service
A hacking group possibly linked to the agency, the main successor to the K.G.B., entered Democratic National Committee servers undetected for nearly a year, security researchers said. The group was nicknamed Cozy Bear, the Dukes or A.P.T. 29 for "advanced persistent threat."
G.R.U.: Military Intelligence
Investigators believe that the G.R.U., or a hacking group known as Fancy Bear or A.P.T. 28, was the second group to break into the D.N.C., but it has played a bigger role in releasing the committee's emails
A self-proclaimed hacker that investigators believe was a group acting as an agent of the G.R.U. It published documents itself and leaked a series of D.N.C. documents.
Investigators say it is a front for the Russian hackers who have tried to disrupt the election this year. It appeared in June as the release of the stolen Democratic Party documents began.
The website released about 50,000 emails from the Democratic National Committee’s computer servers. It is unclear how WikiLeaks obtained the emails. But Russian intelligence agencies are prime suspects, researchers said.
Dozens of newspapers, television stations, bloggers and radio stations around the United States — including The New York Times, The Washington Post and The Wall Street Journal — pursued reporting based on the hacked material, significantly increasing the effects of the cyberattack. In some cases, Guccifer 2.0 and DC Leaks took requests from reporters, releasing documents to them directly.
Obama announced sanctions on Russian officials
President Obama sanctioned Russian individuals and entities and ordered 35 intelligence operatives to leave the United States. The Obama administration released a report by the F.B.I. and Homeland Security that detailed steps that the Russians took to attack the Democratic Party’s computers. Mr. Obama warned President Vladimir V. Putin of Russia in early September to stay out of the American elections.
The leaks cast doubt on the electoral process
According to intelligence officials, the Russians were as surprised as everyone else by Mr. Trump’s victory. But the leaks disrupted the campaign and undercut confidence in the integrity of the vote.
House races in a dozen states were affected
Tens of thousands of pages of hacked D.N.C. documents were selectively released by Guccifer 2.0 to political bloggers and newspaper reporters, causing a backlash against Democrats, like Annette Taddeo, pictured left, running for the House in highly competitive contests.
The hacked Podesta emails dominated news
Weeks before the election, about 60,000 hacked emails from the account of John D. Podesta, Hillary Clinton’s campaign manager, were released, in small amounts, spread over many days. They sparked extensive news coverage about the campaign's internal dynamics (as well as fake news stories).
The leaks fueled a rift in the Democratic Party
The emails forced the resignation of Debbie Wasserman Schultz as chairwoman of the D.N.C. and added to the divide between supporters of Senator Bernie Sanders and Mrs. Clinton's campaign.
The article is from NY Times. There are shades of doubt whether it is all true, whether this was orchestrated and hides other agendas....other than the ones Trump may have.
Course on Cyber Security & Privacy for Directors and Senior Managers
Are you prepared for an attack?
Are you aware of your obligations and defence as a director or officer of the companyt?
Have you taken the necessary steps to mitigate the consequences of a cyber attack?
The topics include:
- Define and understand Cyber security
- Identify Directors Cyber obligations in the Corporate Governance context
- Discuss Cyber risk management
- What can you do as a Director and what questions to ask
- Steps required to create a Cyber Strategy (Board level)
Send your enquiries to: - firstname.lastname@example.org
Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au
© About Over 50s 2017 website by aml websites online