About Over 50 Articles Library


Content: Services - Computer

Computer Security No 35: EU court slams indiscriminate data collection opening challenge to British cyber law

Corporate - Private Computer Security

EU court slams indiscriminate data collection opening challenge to British cyber law

About Over 50  EU court slams indiscriminate data collection opening challenge to British cyber law

(The law requires telecommunication companies to store the web and message history of Britons for the government to access)


1.   Australia passed the Data Retention Bill in 2014

2.   In Australia, The Tellectommunications (Interception and Access) Act 1979 requires companies to retain a particular set of data for at least 2 years

All information about the Australian law is at:


Britain also passed the Data Retention and Investigation Powers Act in 2014

Europe's highest court, the European Court of Justice in Luxembourg, ruled such a law is unjustiafiable in a democratic society.

This is a massive defeat to Britain's new cyber surveillance law which requires telecommunication companies to keep records and web activity of Britons for one year.

The 15-judge panel found it unlawful for European governments to force communication companies to retain all user daata, thus challenging Britain's Investigatory Powers Act, which gave such access to a range of departments.

In its summary ruling, the Luxembourg court found electronic communications allow “very precise conclusions to be drawn concerning the private lives of persons whose data has been retained,” as The Guardian reported.

To read more:- www.csmonitor.com

The story of an election hack (NY Times)

About Over 50 Election hack (NY Times)

Russian government

American intelligence officials said they believed that the hackers were associated with two Russian intelligence agencies.


July 2015

Federal Security Service

A hacking group possibly linked to the agency, the main successor to the K.G.B., entered Democratic National Committee servers undetected for nearly a year, security researchers said. The group was nicknamed Cozy Bear, the Dukes or A.P.T. 29 for "advanced persistent threat."

March 2016

G.R.U.: Military Intelligence

Investigators believe that the G.R.U., or a hacking group known as Fancy Bear or A.P.T. 28, was the second group to break into the D.N.C., but it has played a bigger role in releasing the committee's emails


Guccifer 2.0

A self-proclaimed hacker that investigators believe was a group acting as an agent of the G.R.U. It published documents itself and leaked a series of D.N.C. documents.


Investigators say it is a front for the Russian hackers who have tried to disrupt the election this year. It appeared in June as the release of the stolen Democratic Party documents began.



The website released about 50,000 emails from the Democratic National Committee’s computer servers. It is unclear how WikiLeaks obtained the emails. But Russian intelligence agencies are prime suspects, researchers said.


Dozens of newspapers, television stations, bloggers and radio stations around the United States — including The New York Times, The Washington Post and The Wall Street Journal — pursued reporting based on the hacked material, significantly increasing the effects of the cyberattack. In some cases, Guccifer 2.0 and DC Leaks took requests from reporters, releasing documents to them directly.


Obama announced sanctions on Russian officials

President Obama sanctioned Russian individuals and entities and ordered 35 intelligence operatives to leave the United States. The Obama administration released a report by the F.B.I. and Homeland Security that detailed steps that the Russians took to attack the Democratic Party’s computers. Mr. Obama warned President Vladimir V. Putin of Russia in early September to stay out of the American elections.

The leaks cast doubt on the electoral process

According to intelligence officials, the Russians were as surprised as everyone else by Mr. Trump’s victory. But the leaks disrupted the campaign and undercut confidence in the integrity of the vote.

House races in a dozen states were affected

Tens of thousands of pages of hacked D.N.C. documents were selectively released by Guccifer 2.0 to political bloggers and newspaper reporters, causing a backlash against Democrats, like Annette Taddeo, pictured left, running for the House in highly competitive contests.

The hacked Podesta emails dominated news

Weeks before the election, about 60,000 hacked emails from the account of John D. Podesta, Hillary Clinton’s campaign manager, were released, in small amounts, spread over many days. They sparked extensive news coverage about the campaign's internal dynamics (as well as fake news stories).

The leaks fueled a rift in the Democratic Party

The emails forced the resignation of Debbie Wasserman Schultz as chairwoman of the D.N.C. and added to the divide between supporters of Senator Bernie Sanders and Mrs. Clinton's campaign.

The article is from NY Times. There are shades of doubt whether it is all true, whether this was orchestrated and hides other agendas....other than the ones Trump may have.

Course on Cyber Security & Privacy for Directors and Senior Managers

About Over 50 Yahoo disabled email auto-forwarding

Are you prepared for an attack?

Are you aware of your obligations and defence as a director or officer of the companyt?

Have you taken the necessary steps to mitigate the consequences of a cyber attack?

The topics include:

- Define and understand Cyber security

- Identify Directors Cyber obligations in the Corporate Governance context

- Discuss Cyber risk management

- What can you do as a Director and what questions to ask

- Steps required to create a Cyber Strategy (Board level)

Send your enquiries to: - admin@advisoryboardsgroup.com


About Over 50  EU court slams indiscriminate data collection opening challenge to British cyber law

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au



© About Over 50s 2017             website by aml websites online