Floppy disk containing the source code for the Morris Worm held at the Computer History Museum and Robert Morris on the right.

The Morris Worm, the First Indictment under the CFAA and Wake Up Call of a New Age

On November 2, 1988, Robert Tappan Morris, the son of a famous Bell Labs cryptographer, released and graduate student at Cornell University, released what became known as the “Morris worm” through Massachusetts Institute of Technology (MIT).  Morris stated that his intent was “to demonstrate the inadequacies of current security measures on computer networks by exploiting…

Photo of hacker and Tweet from Barack Obama.

Twitter Hacking Incidents Has Law Enforcement, Washington on Alert

On Wednesday, a hacker accessed 130 prominent Twitter accounts including that of Joe Biden, Mike Bloomberg, Jeff Bezos, Warren Buffett, Bill Gates, Kim Kardashian, Kanye West and the most followed Twitter account on the planet – Barack Obama – to promote a bitcoin scam.  This force Twitter to shut down verified Twitter users’ accounts for…

Digital Lines

Cyber Security Tips – Falls 2019

Since October is Cyber Security Awareness Month, below are some cyber security tips we have tweeted out over the past few months covering protecting sensitive documents, protecting against hacking and ransomware and using Public WiFi spots. Use a flash drive with fingerprint protection for your most sensitive documents. https://t.co/NfblvILaQU #cybersecurity — Internet Law Center (@InternetLawCent)…

Senator Mark Warner

Senator Warner Outlines Options for Regulating Big Tech

The Russian’s use of social media platforms to influence the 2016 election and the fallout from Facebook’s Cambridge Analytica scandal has triggered calls for regulation of the tech sector, but with no proposals emerging. Earlier this month, former acting-Commerce Secretary Cameron Kerry called for reviving the Obama-era Privacy Bill of Rights. Enter Senate Intelligence Committee…

Judge Gerald Tjoflat

Did the 11th Circuit Just Disarm the Nation’s Cybersecurity Cop?

Over the years, the Federal Trade Commission has emerged as the de facto traffic cop in addressing cybersecurity breaches.  Two recent cases sought to challenge the FTC’s authority in this area. The first was Wyndham Worldwide Corporation which challenged the FTC’s authority over data security only to have the Third Circuit affirm’s the FTC’s authority. The…

Facebook Image within a data images

Coalition Launches Campaign to Get Big Tech to Agree to Increase Privacy and Data Security Protections

A coalition of civil liberties and human rights groups have launched a campaign to pressure tech companies to commit to stronger privacy and security practices via a Security Pledge, that they contend “would ensure the Internet is used to expand democracy, not undermine it” if adopted.  The pledge borrows several elements from the European Union’s GDPR…

Devices Communicating

Microsoft Calls for Int’l Body for Cyber Attack Attribution

Following its call earlier this year for a Digital Geneva Convention, to address the growing threat of state sponsored cyber attacks. Microsoft released a paper about cyber security norms for nation-states and the global information and communications technology (ICT) industry. Of particular note is the paper’s call for the equivalent of an International Atomic Energy Agency (IAEA)…

White House with Digital Grid in Background

Congressional Report Sides Firmly With Strong Encryption, Rejecting Back Doors

After the standoff between the Justice Department and Apple over accessing an encrypted cell phone connected to the San Bernardino terrorist attack, members of the House Judiciary and Energy & Commerce Committees created a bi-partisan Encryption Working Group (“EWG”) to “conduct a thorough and objective review of the encryption challenge.” The EWG has issued its initial…