Ng AMERICAN UNIVERSITY BLR BUSINESS LAW REVIEW - VOLUME 2* 2013 * ISSUE 2

Total Page:16

File Type:pdf, Size:1020Kb

Ng AMERICAN UNIVERSITY BLR BUSINESS LAW REVIEW - VOLUME 2* 2013 * ISSUE 2 Ng AMERICAN UNIVERSITY BLR BUSINESS LAW REVIEW - VOLUME 2* 2013 * ISSUE 2 ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY ............ ........ MELANIE J. TEPLINSKY RELIANCE ON EXPERTS FROM A CORPORATE LAw PERSPECTIVE. ....... ALEXANDROS N. RoKs COMMENTS PETITIONING FOR CASH: How DOMESTIC INDUSTRIES EXPLOIT ANTIDUMPING PROCEDURES AND ANTITRUST EXCEPTIONS TO FORCE THEIR FOREIGN COMPETITORS INTO LUCRATIVE SETTLEMENT AGREEMENTS ...... DANIEL FULLERTON IGNORING THE TECHNICALITY'S TEMPTATION: INTERPRETING THE CITIZENSHIP OF A FOREIGN OFFICIAL UNDER THE FOREIGN CORRUPT PRACTICES ACT................ ELIZABETH GRANT NOTE THE POLL-INTEL INDUSTRY: CONSIDERING THE COMMON LAW'S APPLICATION IN INSIDER TRADING UNDER THE STOCK ACT.................. ERNIE C. JOLLY AU AMERICAN UNIVERSITY BLR BUSINESS LAW REVIEW The AMERICAN UNIVERSITY BUSINESS LAW REVIEW is published twice a year (fall and spring academic semesters) by students of the Washington College of Law, American University, 4801 Massachusetts Avenue, N.W., Suite 615A, Washington, D.C. 20016. Manuscripts should be sent to the Executive Editor at the above listed address or electronically at [email protected]. The opinions expressed in articles herein are those of the signed authors and do not reflect the views of the Washington College of Law or the American University Business Law Review. All authors are requested and expected to disclose any economic or professional interests or affiliations that may have influenced positions taken or advocated in their articles, notes, comments, or other materials submitted. That such disclosures have been made is impliedly represented by each author. Subscription rate per year: $45.00 domestic, $50.00 foreign, $30.00 alumni, $20.00 single issue. Periodicals postage paid at Washington, D.C., and additional mailing offices. Office of Publication: 4801 Massachusetts Avenue, N.W., Suite 615A, Washington, D.C. 20016. Printing Office: Joe Christensen, Inc., 1540 Adams Street, Lincoln, Nebraska 68521. POSTMASTER: Send address changes to the AMERICAN UNIVERSITY BUSINESS LAW REVIEW, 4801 Massachusetts Avenue, N.W., Suite 615A, Washington, D.C. 20016. Subscriptions are renewed automatically on expiration unless cancellation is requested. It is our policy that unless a claim is made for nonreceipt of the AMERICAN UNIVERSITY BUSINESS LAW REVIEW issues within six months of the mailing date, the American University Business Law Review cannot be held responsible for supplying those issues without charge. Citations conform generally to The Bluebook: A Uniform System of Citation (19th ed. 2010). To be cited as: 2 AM. U. Bus. L. REV. American University Business Law Review Print ISSN 2168-6890 Online ISSN 2168-6904 0 Copyright 2013 American University Business Law Review AMERICAN UNIVERSITY BUSINESS LAW REVIEW VOLUME 2 - 2013 - ISSUE 2 YARITZA VELEZ Editor-in-Chief ALEXANDRA MACKEY ARJUN PRASAD Managing Editor Executive Editor AMANDA NAOUFAL Associate Managing Editor BEADLE NICHOLAS JACOB HARPER ART HOwSON Senior Articles Editor JOHN MONTERUBIO Senior Note & Comment Business & Marketing Editor Editors Articles Editors Note & Comment Editors DAVID CHEE JAMIE LARSON JODIE BENSMAN KENNETH LADUCA Symposium Editor YUKI HARAGUCHI PATRICK MAURO LESLEY DELANEY HAWKINS AMIT RAVIV GREGORY SANTIAGO JAMES HENNELLY VIVIANETTE VELAZQUEZ Technical Editor SLAVA KUPERSTEIN STEVEN VONBERG MOHAMMAD NILFOROUSH Senior Staff ELIF CILA CHARLIE HARMS JACQUELYN SHELTON SETH DENNIS JEFFREY KETTLE SARAH THOMAS MICHAEL GEBAUER ERICA PARRA ALEXANDER YOU SAM REXON Junior Staff ARA ADEDUGBE COREY GERSON EMILY ROBERTS THOMAS AHMADIFAR DIANE GHRIST NIVEDITA SATHIAKUMAR CATHERINE BOURQUE JOSEPH GOLINKER JENNIFER SIMILE JONATHAN BROWN ELIZABETH GRANT ASHTON SIMMONS JAIMIE BUCHBINDER DAVID HAN JEFF SIVEK JORDAN CAFRITZ ELIZABETH HARRIS JASON SOKEL DARSHAN CHULANI JUSTIN HEMMINGS WILLIAM STANLEY SHERYL COZART ALEX HERD JULIA SVINTSOVA ZACHARY DAVIS EMILY HETU LAURA TARABAN CHRISTIAN DEROO KATHLEEN HSu HEBA TELLAWI NATASHA DHILLON CHARLES HUANG CORINNE WARREN JESSICA DIPIETRO ERNIE JOLLY MICHELLE WINTERS SARA FALK STEFANIE JONES PHILLIP YOFFE DANIEL FULLERTON ZACHARY MASON AVIE XU ZHAO DESTINY FULLWOOD MONIKA MASTELLONE CHANG ZHOU WILLIAM GENSCHOW BROOKE OLAUSSEN SHENG ZHOU Law Review Coordinator SHARON E. WOLFE ------------ AMERICAN UNIVERSITY WASHINGTON COLLEGE OF LAW FACULTY Administration Claudio M. Grossman, B.A., J.D., Doctor of Science of Law, Dean Anthony E. Varona, A.B., J.D., LL.M., Associate Dean ofFaculty and Academic Affairs Mary L. Clark, A.B., J.D., LL.M., Associate Dean of Faculty and Academic Affairs David B. Jaffe, B.A., J.D., Associate Dean of Student Affairs Ruth Swanson, B.M., Associate Dean ofDevelopment and Alumni Relations *Billie Jo Kaufman, B.S., M.S., J.D., Associate Dean ofLibrary and Information Resources Robert D. Dinerstein, A.B., J.D., Associate Dean ofExperientialEducation and Directorof ClinicalPrograms Stephen I. Vladeck, B.A., J.D., Associate Dean ofScholarship Khalid R. 0. Khalid, B.A., M.A., Assistant Dean ofFinanceand Administration Rebecca T. Davis, B.S., M.A.T, Assistant Dean ofAcademic Services and Registrar D. Akira Shiroma, B.A., J.D., Assistant Dean ofAdmissions and FinancialAid Traci Mundy Jenkins, B.A., J.D., Assistant Dean for Careerand ProfessionalDevelopment Lia Epperson, B.A., J.D., Director ofthe S.JD. Program David Hunter, B.A., J.D., Directorofthe InternationalLegal Studies Program Jamin B. Raskin, B.A., J.D., Directorof the Law and Government Program David E. Aaronson, B.A., M.A., Ph.D., Directorofthe Trial Advocacy Program Teresa Godwin Phelps, B.A., M.A., M.S.L, Ph.D., Directorofthe Legal Rhetoric Program Ann Shalleck, A.B., J.D., Directorofthe Women and the Law Program Full-Time Faculty David E. Aaronson, B.A., M.A., Ph.D., The George Washington University; LL.B., Harvard University; LL.M., Georgetown University. B. 1 Tennery Professor ofLaw and Directorofthe Trial Advocacy Program Evelyn G. Abravanel, A.B., J.D., Case Western Reserve University. ProfessorofLaw Padideh Ala'i, B.A., University of Oregon; J.D., Harvard University. Professor ofLaw Jonas Anderson, B.S., University of Utah; J.D., Harvard University. Assistant Professorof Law *Kenneth Anderson, B.A., University of California-Los Angeles; J.D., Harvard University. Professor of Law (on leave Spring 2013) Isaiah Baker, B.A., Yale University; M.A., DePaul University; M.B.A., J.D., Columbia University; LL.M., Harvard University. Associate Professor ofLaw (on leave 2012-2013) Jonathan B. Baker, A.B., J.D., Harvard University; M.A., Ph.D., Stanford University. ProfessorofLaw Susan D. Bennett, B.A., M.A., Yale University; J.D., Columbia University. Professor ofLaw Daniel Bradlow, B.A., University of Witwatersrand, South Africa; J.D., Northeastern University; LL.M., Georgetown University. Professor ofLaw (on leave Spring 2013) Pamela Bridgewater, B.S., Florida Agricultural and Mechanical University; J.D., Florida State University; LL.M., University of Wisconsin. Professorof Law (on leave 2012-2013) Barlow Burke Jr., A.B., Harvard University; LL.B., MCP, University of Pennsylvania; LL.M., S.J.D., Yale University. Professor ofLaw and John S. Myers andAlvina Reckman Myers Scholar Susan D. Carle, A.B., Bryn Mawr College; J.D., Yale University. Professor ofLaw Michael W. Carroll, A.B., University of Chicago; J.D., Georgetown University. ProfessorofLaw and Director ofthe Programon Information Justice and Intellectual Property David F. Chavkin, B.S., Michigan State University; J.D., University of California, Berkeley. ProfessorofLaw (on leave Spring 2013) Janie Chuang, B.A., Yale University; J.D., Harvard University. Associate Professor ofLaw Mary Clark, A.B., Bryn Mawr College; J.D., Harvard University, LL.M., Georgetown University. Professorof Law andAssociateDean of Faculty and Academic Affairs Jorge Contreras, B.S.EE, B.A., Rice University; J.D., Harvard University. Associate Professor ofLaw John B. Corr, B.A., M.A., John Carroll University; Ph.D., Kent State University; J.D., Georgetown University. Professor ofLaw Angela Jordan Davis, B.A., Howard University; J.D., Harvard University. ProfessorofLaw Amy Dillard, B.A., Wellesley College; J.D., Washington and Lee University. Visiting Assistant ProfessorofLaw (Spring 2013) Robert D. Dinerstein, A.B., Cornell University; J.D., Yale University. Professor ofLaw, Associate Dean ofExperientialEducation, and DirectorofClinical Programs N. Jeremi Duru, B.A., Brown University; M.P.P., J.D., Harvard University, ProfessorofLaw (Spring 2013) *Walter A. Effross, A.B., Princeton University; J.D., Harvard University. Professor ofLaw and Directorofthe Programon CounselingElectronic Commerce Entrepreneurs Lia Epperson, B.A., Harvard University; J.D., Stanford University. Associate ProfessorofLaw and Director ofthe S.J.D. Program *Christine Haight Farley, B.A., State University of New York, Binghamton; J.D., State University of New York, Buffalo; LL.M., J.S.D., Columbia University. ProfessorofLaw (on leave Spring 2013) Amanda Frost, B.A., J.D., Harvard University. ProfessorofLaw *Anna Gelpern, A.B., Princeton University; J.D., Harvard University. Professor ofLaw (on leave Fall 2012) Robert K. Goldman, B.A., University of Pennsylvania; J.D., University of Virginia. Professorof Law and Louis C. James Scholar Claudio M. Grossman, Licenciado en Ciencias Juridicas y Sociales, Universidad de Chile, Santiago; Doctor of Science of Law, University of Amsterdam. Dean, Professorof Law, andRaymondl. Geraldson Scholarfor Internationaland Humanitarian
Recommended publications
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Defending Against Increasingly Sophisticated Cyber Attacks HP Tippingpoint Bolsters Enterprise Data Center Protection
    50 Years of Growth, Innovation and Leadership Defending Against Increasingly Sophisticated Cyber Attacks HP TippingPoint Bolsters Enterprise Data Center Protection A Frost & Sullivan White Paper Chris Rodriguez Senior Industry Analyst www.frost.com Frost & Sullivan The Evolving Enterprise Security Threat............................................................................. 3 Driving Trends ....................................................................................................................... 3 Key Challenges ..................................................................................................................... 4 Recent High-Profile Security Breaches ............................................................................... 5 Protecting Enterprise Physical and Virtual Data Centers.................................................. 6 Meeting Critical Enterprise Needs ...................................................................................... 6 Optimizing for a Virtualized Environment .......................................................................... 8 Weighing Vendor Solutions ................................................................................................... 8 Why HP? ................................................................................................................................. 9 HP DVLabs’ Cutting Edge Research .................................................................................... 9 Benefits of HP’s NGIPS Technology ...................................................................................
    [Show full text]
  • Cyber-Threats and Financial Institutions: Assume All Networks Are Infected...Is This the New Normal?
    Cyber-Threats and Financial Institutions: Assume all networks are infected...Is this the new normal? October 2012 Sponsored by: Cyber-Threats and Financial Institutions WHITE PAPER Cyber-Threats and Financial Institutions: Assume all networks are infected...Is this the new normal? Executive Summary Financial Institutions, an already highly targeted industry by cyber criminals, should only expect the number and sophistication of malicious attacks to grow. The adoption of Internet-based commerce systems, while convenient for customers and nancially bene cial for some institutions, provides crimi- nals with more opportunities to steal both money and information. Cyber- thieves continue to introduce highly sophisticated malware strains to take ad- vantage of vulnerabilities. Bank customers infected with the strains --which frequently go undetected by anti-virus so ware – expose nancial institu- tions to computer network contamination. As a result, the recent consensus among banks has been to assume that all customer PCs are infected. Introduction Since America’s rst bank robbery in Philadelphia in 1798, nancial insti- tutions have been a favorite target of criminals. Some of the nation’s most recognizable crooks such as Butch Cassidy, John Dillinger and Jesse James attained notoriety by robbing banks. In the 21st century, technology has changed the game. According to Professor Udo Helmbrecht, the Execu- tive Director of the European Network and Information Security Agency (ENISA),“the old adage, ‘criminals go where the money is’, today means that ‘bank robbers go online.’”1 Many criminals now operate in anonymity from miles, or even oceans, away from their targets. These capable cyber- criminals are implementing increasingly sophisticated attacks, hitting many more targets and impacting many more people.
    [Show full text]
  • CERIAS Tech Report 2014-3 US Bank of Cyber
    CERIAS Tech Report 2014-3 U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System by Crimmins, Falk, Fowler, Gravel, Kouremetis, Poremski, Sitarz, Sturgeon, Zhang Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 U.S. Bank of Cyber An analysis of Cyber Attacks on the U.S. Financial System Under the Direction of Dr. Sam Liles Written by: (In Alphabetical Order) Danielle Crimmins Courtney Falk Susan Fowler Caitlin Gravel Michael Kouremetis Erin Poremski Rachel Sitarz Nick Sturgeon CNIT 58100 Spring 2014 Yulong Zhang Executive Summary The following paper looks at past cyber attacks on the United States fi nancial industry for analysis on attack patterns by individuals, groups, and nationstates to determine if the industry really is under attack. The paper fi rst defi nes the terms used, then explains the theory and paradigm of cyber attacks on the U.S. fi nancial industry. Following is a graphical and detailed timeline of known cyber attacks on the U.S. fi nancial industry reaching from 1970 through 2014. Four attack cases are chosen to be researched in summary and four attack cases are chosen to be researched in depth. These cases include: Kalinin & Nasenkov, Mt. Gox, Stock Market Manipulation Scheme, Project Blitzkrieg, Union Dime Savings Bank Embezzlement, National Bank of Chicago Wire Heist, and an attempted Citibank Heist. An analysis then explores attack origination from individuals, groups, and/or nation states as well as type of attacks and any patterns seen. After gathering attacks and creation of a timeline, a taxonomy of attacks is then created from the analysis of attack data.
    [Show full text]
  • Dissecting Operation High Roller
    White Paper Dissecting Operation High Roller Dave Marcus, Director of Advanced Research and Threat Intelligence, McAfee Ryan Sherstobitoff, Threat Researcher, Guardian Analytics How the high-tech mantra of “automation and innovation” helps a multi-tiered global fraud ring target high net worth businesses and individuals. Building on established Zeus and SpyEye tactics, this ring adds many breakthroughs: bypasses for physical multi-factor authentication, automated mule account databases, server-based fraudulent transactions, and attempted transfers to mule business accounts as high as €100,000 ($130,000 USD). Where Europe has been the primary target for this and other financial fraud rings in the past, our research found the thefts spreading outside Europe, including the United States and Colombia. Table of Contents Executive Summary 3 A Timeline in Case Studies 4 Glossary of Terms 4 An Automated Attack In Italy 4 Campaign Appears in Germany 5 Fraudsters Hit Netherlands Banking Hard 5 Expansion to Latin America 6 Fraudsters in the Netherlands Also Active in the United States 7 New Heights In Heists: What’s New Compared To SpyEye and Zeus? 8 Extensive Automation 8 Server-side Automation 8 Rich targets 8 Automated Bypass of Two-Factor Physical Authentication 9 Techniques against Standard Security Software 9 Techniques to Avoid Fraud Detection 10 Techniques to Hide Evidence 10 Three Attack Strategies 10 Strategy 1: Automated Consumer Attacks 10 Strategy 2: Automated Server-based Attacks 12 Strategy 3: Hybrid Automated/Manual Attacks 14 Against Marquee Business Accounts Recovery and Remediation Efforts 14 Lessons Learned 15 Appendix 17 About the Authors 19 About McAfee 19 About Guardian Analytics 19 2 Dissecting Operation High Roller Executive Summary McAfee and Guardian Analytics have uncovered a highly sophisticated, global financial services fraud campaign that has reached the American banking system.
    [Show full text]
  • Mcafee Threats Report: Fourth Quarter 2012
    Report McAfee Threats Report: Fourth Quarter 2012 By McAfee Labs Table of Contents Operation High Roller Expands 4 Project Blitzkrieg 4 Mobile Threats 4 Spyware 5 Mobile Exploits 6 Mobile Backdoors 6 General Malware Threats 6 Ransomware 12 Network Threats 13 Database Security 15 Web Threats 17 Phishing 20 Messaging Threats 20 Spam volume 21 Botnet breakdowns 23 New botnet senders 24 Messaging botnet prevalence 26 Drug spam remains strong 27 Cybercrime 28 Crimeware tools 33 Actions against Cybercriminals 34 Hacktivism 35 Cyberextremism: Terrorism and the Internet 36 About the Authors 37 About McAfee Labs 37 About McAfee 37 2 McAfee Threats Report: Fourth Quarter 2012 As McAfee Labs analyzed threats during the fourth quarter of 2012, we saw a number of familiar trends: terrifically rapid growth in mobile malware and a steady increase in general malware, including fake antivirus and signed malware. Spam rose at first but then returned to the level that it began the quarter. New botnet infections followed a similar path, with growth in October that eventually cooled, resulting in an end point that was lower than the prior quarter’s. Narrowly targeted attacks continue. Our on-going analysis of Operation High Roller and Project Blitzkrieg shows that cybercriminals can be patient when playing for high stakes. Our count of mobile malware samples has surpassed 36,000, with almost all of it aimed at the Android OS and having arrived in the past year. Spyware, exploits, and backdoor Trojans highlighted this quarter’s assaults on mobile phones. Our analysis of web threats found that the number of new suspicious URLs increased by 70 percent this quarter.
    [Show full text]
  • Israel Edition July 2018
    The Observatory© Israel Edition July 2018 S O www.cyberstartupobservatory.com Meet the participating companies: Gold SC Silver Cyber Of Things Bronze The Observatory© Nir Chervoni Gary Hayslip Credorax Group Webroot Anyck Turgeon IBM Dr. Mansur Hasib Glauco Sampaio Cybersecurity Leader Banco Original Hall of Fame Q2 & Q3 2018 The purpose of the Cybersecurity Startup Observatory is to collaborate to build a safer society and to help solve important problems leveraging cybersecurity innovation. Find out more and tell us what matters to you by visiting us at: www.cyberstartupobservatory.com This publication has been prepared for general guidance on matters of interest only and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, Smartrev Analytics Consultants SLU, its members and employees do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. In this document, “Cyber Startup Observatory” and “Smartrev Cybersec” refer to trademarks belonging to Smartrev Analytics Consultants SLU. The information provided by the participating startups and companies belongs to them. They remain the sole and exclusive owner of any information provided to Smartev including without limitation, with respect to any intellectual property rights, copyrights and trademarks. Smartrev Analytics Consultants SLU have received explicit written permission to publish all the information included in this report.
    [Show full text]
  • State Department News Clips
    United States Department of State Washington, D. C. 20520 October 10, 2018 Case No.: F-201 8-00529, F-2018-00827, F-2018-01063, & F-201 8-01467 Michael Bekesha, Esq. Judicial Watch, Inc. 425 Third Street, S.W., Suite 800 Washington, D.C. 20024 Dear Mr. Bekesha: I refer you to our letter dated September 12, 2018, regarding the review of certain Department of State material under the Freedom oflnformation Act (the "FOIA"), 5 U.S.C. § 552. The review of potentially responsive records is ongoing and has resulted in the retrieval of nine documents responsive to your request. After reviewing these documents, we have determined that seven may be released in full and two may be released in part. All released material is enclosed. Where a document has been released to you in part, all non-exempt material that is reasonably segregable from the exempt material has been released. Where we have made excisions, the applicable exemptions are marked on the document. An enclosure provides information on FOIA exemptions and other grounds for withholding material. We will keep you advised as your case progresses. If you have any questions, you may contact Trial Attorney Damon William Taaffe at (202) 252-2544 or damon.taaffe@usdoj. gov. Please refer to the case numbers cited above and the civil action number, l 8-cv-968, in all correspondence regarding this case. c~Sincerely, eeunan~ Chief, Programs and Polici 1v1s10n Office of Information Programs and Services Enclosures: As stated The Freedom of Information Act (5 USC 552) FOIA Exemptions (b)(1) Information specifically authorized by an executive order to be kept secret in the interest of national defense or foreign policy.
    [Show full text]
  • Technical Report RHUL–ISG–2021–2 10 March 2021
    Protecting Personal Investors on UK Investment Platforms from Cyber Threats Gerard Phillips Technical Report RHUL–ISG–2021–2 10 March 2021 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom Student Number: 100937313 Gerard Phillips Protecting Personal Investors on UK Investment Platforms from Cyber Threats Supervisor: Geraint Price Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Date: 23 August 2020 Page 1 of 153 Table of Contents TABLE OF CONTENTS ......................................................................................................................... 2 LIST OF FIGURES ............................................................................................................................... 4 LIST OF TABLES ................................................................................................................................. 4 GLOSSARY ........................................................................................................................................ 5 EXECUTIVE SUMMARY .....................................................................................................................
    [Show full text]
  • Internet Infrastructure Review Vol.18 -Infrastructure Security
    1. Infrastructure Security Tor Technology In this report we discuss the Tor system used for anonymous communications, look at the Citadel variant of the ZeuS malware that was used to attack users of Japanese fi nancial institutions in the latter half of last year, and examine a spate of issues affecting protocols and implementations that use cryptographic technology. Infrastructure Security 1.1 Introduction This report summarizes incidents to which IIJ responded, based on general information obtained by IIJ itself related to the stable operation of the Internet, information from observations of incidents, information acquired through our services, and information obtained from companies and organizations with which IIJ has cooperative relationships. This volume covers the period of time from October 1 through December 31, 2012. In this period a number of hacktivism-based attacks were once again carried out by Anonymous, and a series of targeted attacks on companies and government-related institutions were discovered. There have also been widespread domain hijackings and alterations on a national scale due to attacks on a number of organizations involved with country-code Top-level Domains (ccTLDs). In Japan, the “Remote Control Virus” and a series of incidents related to it became big news. Malware infections at government-related institutions in Japan are also continuing. As seen above, the Internet continues to experience many security-related incidents. 1.2 Incident Summary Here, we discuss the IIJ handling and response to incidents that occurred between October 1 and December 31, 2012. Figure 1 shows the distribution of incidents handled during this period*1. Other 29.5% Vulnerabilities 29.9% I The Activities of Anonymous and Other Hacktivists Attacks by hacktivists such as Anonymous continued during this period.
    [Show full text]
  • Mcafee Threats Report: Third Quarter 2012
    Report McAfee Threats Report: Third Quarter 2012 By McAfee Labs Table of Contents Operation High Roller 4 Dynamically hiding the evidence 5 Links to European and Asia-Pacific campaigns 6 Mobile Malware 7 General Malware Threats 9 Ransomware 15 Network Threats 16 Database Security 19 Web Threats 20 Phishing 23 Spam URLs 25 Messaging Threats 25 Spam volume 26 Botnet breakdowns 28 New botnet senders 29 Drug spam a popular subject 32 Cybercrime 33 Demanding ransom 33 Crimeware tools 34 Actions against cybercriminals 35 Hacktivism 36 A touch of cyberwarfare 37 About the Authors 39 About McAfee Labs 39 About McAfee 39 2 McAfee Threats Report: Third Quarter 2012 Threat analysis, in many ways, is equal parts art and science. At McAfee Labs we try to apply as much math and analytical rigor to our analysis as we can, but we often cannot see the whole picture. We must also interpret and surmise many things. German philosopher Friedrich Nietzsche wrote “There are no facts, only interpretations.” This bit of wisdom strikes us as quite relevant to analyzing threats. Depending on one’s perspective, threats can mean many things. Spam, for example, looks like it’s on a steady decline when viewed globally, but when looked at locally or by country we see tremendous variations. The same can be said of many threat vectors we analyze in this edition of the McAfee Threats Report: One’s perspective makes all the difference. The trends within the threats landscape seem at times akin to predicting weather patterns or stock prices. We know they will go up and they will go down.
    [Show full text]