Header graphic for print
Steptoe Cyberblog

Monthly Archives: December 2012

FTC’s Online Privacy Campaign Goes into High Gear

Posted in Privacy Regulation, Security Programs & Policies

The Federal Trade Commission is really on a roll these days. In the last few weeks alone it has: reached settlements with two companies, Compete, Inc. and Epic Marketplace, Inc., over the FTC’s charges that the two companies deceived consumers by misrepresenting their online data collection practices; released a blistering report criticizing the developers of mobile apps… Continue Reading

Prosecuting Cyberespionage – Justice’s New Strategy

Posted in Cybersecurity and Cyberwar, International, Security Programs & Policies

The National Security Division of the Justice Department may be getting on the cyberspace attribution/retribution bandwagon — and in the process, reshaping US strategy for deterring cyberespionage. First, they are creating a new liaison position in US Attorney offices across the country — the National Security Cybersecurity Specialist, or NSCS (rhymes with “discus meniscus” for you… Continue Reading

US Head of Delegation at WCIT Badmouths Deep Packet Inspection

Posted in International, Privacy Regulation

It’s been a contentious meeting in Dubai at the World Conference on International Telecommunications (WCIT), where the United States and its allies have been trying to fend off efforts by Russia, China, and others to expand the writ of the International Telecommunications Union to cover the Internet. Besides that fundamental dispute, there have been some… Continue Reading

Finding Cyberspies

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

For a while now I believe that attribution of hacker attacks has been rapidly improving. Well now we have confirmation from a Ken Dilanian scoop in the LA Times. Dilanian reports that “the U.S. intelligence community is nearing completion of its first detailed review of cyber-spying against American targets from abroad, including an attempt to calculate U.S. financial losses from… Continue Reading

Why Do the Feds Care About Officials’ Private Emails?

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

For those who have wondered why the feds cared about what former CIA Director David Petraeus was doing on his private email account, recent reports on hacks into the personal computers of former Chairman of the Joint Chiefs of Staff Mike Mullen provide at least a clue. Mullen’s personal computers, which he used while working… Continue Reading

More on Cybersecurity and Attribution: Si Chuan University and Tencent

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Previously, I told the story of how Trend Micro identified “Luckycat,” a Chinese hacker who had attacked the Dalai Lama, aerospace firms, and other targets. Based on what we know so far, the likely hacker is Gu Kaiyuan, formerly a student at Si Chuan University’s Information Security Institute and currently employed by the large Chinese instant… Continue Reading