Cyber-Investigative Issues II

Total Page:16

File Type:pdf, Size:1020Kb

Cyber-Investigative Issues II Cyber-Investigative Issues II In This Issue March 2014 The Flood Tide of Cyberfraud . .1 Volume 62 By Jonathan J. Rusch Number 2 Cybersecurity: The Urgent Challenge of Our Time . .16 United States By Sean B. Hoar Department of Justice Executive Office for United States Attorneys International Cooperation: A Primer of the Tools and Resources Washington, DC Available When Your Investigation Takes You Overseas . 23 20530 By Michael Chu H. Marshall Jarrett Director Overcoming the Unique Challenges Presented in “Time Bomb” Contributors’ opinions and statements should not be considered an Computer Intrusion Cases . 30 endorsement by EOUSA for any By Mark L. Krotoski policy, program, or service. The United States Attorneys’ Bulletin is published pursuant to From the P.R.C. to the F.C.I.—Cracking a Chinese Cybercrime 28 CFR § 0.22(b). Case . 47 The United States Attorneys’ Bulletin By Edward J. McAndrew is published bimonthly by the Executive Office for United States Attorneys, Office of Legal Education, The Degree of Fourth Amendment Protections Afforded to Foreign 1620 Pendleton Street, Columbia, South Carolina 29201. Searches . 63 By Mi Yung Park Managing Editor Jim Donovan Eenie, Meenie, Miney, Mo: Choosing and Working With an Expert Associate Editor in a Stolen Trade Secrets Case . 68 Carmel Matin By Scott L. Garland Law Clerk Jennifer Jokerst Child Pornography Conspiracies in the Digital Age: A Primer . 75 Internet Address By Sarah Chang and Keith Becker www.usdoj.gov/usao/ reading_room/foiamanuals. html Send article submissions and address changes to Managing Editor, United States Attorneys’ Bulletin, National Advocacy Center, Office of Legal Education, 1620 Pendleton Street, Columbia, SC 29201. The Flood Tide of Cyberfraud Jonathan J. Rusch Deputy Chief for Strategy and Policy Fraud Section Criminal Division Cyberfraud, also known as online fraud or Internet fraud, can be defined simply as “the use of the internet to get money, goods, etc. from people illegally by deceiving them.” CAMBRIDGE DICTIONARIES ONLINE, http://dictionary.cambridge.org/us/dictionary/british/cyberfraud. Over the past decade, as the World Wide Web has become increasingly indispensable for global communication and commerce, cyberfraud has become a flood tide that poses significant threats to individuals and businesses around the world. I. Incidence and prevalence of cyberfraud There are no comprehensive measures of cyberfraud worldwide. Various surveys and reports, however, provide some indications of its incidence and prevalence. The 2014 Identity Fraud Report by a private-sector research firm, Javelin Strategy & Research, found that the incidence of fraud involving the misuse of consumers’ legitimate existing accounts (including credit- and debit-card and non-card accounts) increased by 36 percent since 2012. JAVELIN STRATEGY & RESEARCH, 2014 IDENTITY FRAUD REPORT 11 (Feb. 2014). The Report specifically attributed that increase “to the increasing availability of compromised credentials online, in databases gleaned from data breaches and malware.” Id. The Report also found that existing non-card fraud, involving misuse of loan accounts, Internet accounts such as eBay and Amazon, and online payment accounts such as eBay, had increased nearly threefold since 2012, resulting in losses of $5 billion. Id. at 3, 14. The 2012 Annual Report of the Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center, stated that the 289,874 consumer complaints it received in 2012 had an adjusted dollar loss of $525,441,110. That loss represents an 8.3 percent increase in reported losses since 2011. INTERNET CRIME COMPLAINT CENTER, 2012 ANNUAL REPORT 4 (May 4, 2013), available at http://www.ic3.gov/media/annualreport/2012_IC3Report.pdf. A 2013 survey of U.S. and Canadian online merchants found that in 2012, online payments fraud accounted for approximately $3.5 billion in revenue losses. CYBERSOURCE, 2013 ONLINE FRAUD REPORT 4 (2013), available at http://form s.cybersource.com/forms/fraudreport2013. In 2013, a number of leading U.S. retail businesses such as Target, Neiman Marcus, White Lodging, Harbor Freight Tools, Easton-Bell Sports, Michaels Stores, and ’Wichcraft reportedly all suffered data breaches of varying sizes stemming from compromise of point-of-sale terminals. See MCAFEE, MCAFEE LABS THREATS REPORT: FOURTH QUARTER 2013 5 (2013), available at http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdf. Businesses may suffer additional adverse effects beyond the immediate loss of funds and customer data. One prominent example of this is Target, which experienced a major data breach in 2013. According to a consulting group, Target reportedly saw its customer traffic in January 2014, both online and in stores, reach its lowest point in 3 years, as 33 percent of U.S. households shopped at Target in January of that year, compared with 43 percent in January 2013. Hadley Malcolm, Target sees drop in customer visits after breach, USA TODAY (Mar. 11, 2014), http://www.usatoday.com/story/money/busin ess/2014/03/11/target-customer-traffic/6262059/. Public and private enterprises in other regions of the world have also come to see cyberfraud as a formidable threat. A recent survey of merchants in the United Kingdom found that in 2012, merchants reported that 1.65 percent of e-commerce revenues were lost to fraud. CYBERSOURCE, THE TURNING MARCH 2014 United States Attorneys’ Bulletin 1 POINT: 2013 UK ECOMMERCE FRAUD REPORT 3 (2013), available at http://forms.cybersource.com/for ms/ukfraudreport2013. This number, incidentally, is 1.8 times greater than the 0.9 percent of online revenue that U.S. and Canadian enterprises reported were lost to fraud in 2012. CYBERSOURCE, 2013 ONLINE FRAUD REPORT 4 (2013), available at http://forms.cybersource.com/forms/fraudreport2013. In March 2014, CIFAS, the United Kingdom’s fraud prevention service, reported that 90 percent of identity fraud on plastic payment cards was occurring online. CIFAS, FRAUDSCAPE 9 (2014), available at http://www.cifas.org.uk/fraudscape_twentyfourteen. In Australia, the Australia Institute of Criminology 2012 online survey of Australian consumers found that 95 percent of the respondents had received a scam invitation of some type, with email as the most common method of delivering a fraudulent solicitation (reported by 72 percent of respondents), and that 8 percent of respondents reported having lost money—approximately AU $8,000 per person on average. PENNY JORNA & ALICE HUTCHINGS, AUSTRALIAN INSTITUTE OF CRIMINOLOGY, AUSTRALASIAN CONSUMER FRAUD TASKFORCE: RESULTS OF THE 2012 ONLINE CONSUMER FRAUD SURVEY, TECHNICAL AND BACKGROUND PAPER 56 v, xii, 7–11 (2013), http://www.aic.gov.au/media_ library/publications/tbp/tbp056/tbp056.pdf. The survey also noted that the mean loss to scams was AU $7,908, even though the median loss was only AU $500, see id. at xii, 11, which appears due to the reporting of other scams in which victims were defrauded of lesser amounts of money, such as the so- called “Microsoft” (computer-repair) scam and work-at-home schemes. See id. at 10. And in Oman, in the first quarter of 2013 a leading financial institution reportedly suffered a loss of nearly U.S. $39 million— around 10.5 percent of the bank’s estimated 2013 earnings—from a cyberfraud scheme that used prepaid cards to make fraudulent funds transfers. See Beatrice Thomas, Bank Muscat posts $266m profit, despite cyber fraud exposure, ARABIANBUSINESS.COM (Oct. 28, 2013), http://www.arabianbusiness.com/bank- muscat-posts-266m-profit-despite-cyber-fraud-exposure-524501.html. II. Extortion- and intimidation-based schemes Although there are many varieties of fraud schemes that exploit the Internet and computing, one of the most noteworthy cyberfraud trends has been the growth of schemes that go beyond traditional fraud techniques and use extortionate, intimidating, or other fear-inducing language to make victims believe they have no choice but to send the funds that the schemes demand. As shown below in Table 1, there are seven distinguishable types of such schemes, defined in terms of (1) whether the threat is direct or indirect (that is, directed at the victim being contacted or at another person known to the victim), and (2) what type of harm is threatened (that is, whether the scheme threatens physical harm, law enforcement action such as arrest, harm to financial data, or psychological harm). ______________________________________________________________________________ Table 1: Cyberfraud Schemes Involving Extortionate, Intimidating, or Fear-Inducing Language Type of Threat Direct Threat Indirect Threat Physical Harm Jamaican-Operated Lottery “Grandparent” - Assault/Accident , Email Address Book Law Enforcement Action (e.g., Arrest) Ransomware “Grandparent” – Arrest, Email Address Book Harm to Financial Data Phishing/Malware “Technical Support” Psychological Harm Sexual Blackmail — ______________________________________________________________________________ A. Jamaican-operated lottery schemes The most egregious example of cyberfraud using direct threats of physical harm is the version of fraudulent lottery schemes that Jamaica-based persons conduct. Though largely similar to traditional lottery schemes, which falsely promise victims substantial lottery winnings once they have paid bogus 2 United States Attorneys’ Bulletin MARCH 2014 “fees” or “taxes,” Jamaica-based schemes routinely go beyond traditional fraudulent pitches by email or telephone and use express
Recommended publications
  • The Mashups of Youtube
    10.2478/nor-2013-0053 Nordicom Review 34 (2013) 2, pp. 47-63 The Mashups of YouTube Thomas Mosebo Simonsen Abstract This article focuses on YouTube mashups and how we can understand them as a specific subgenre on YouTube. The Mashups are analysed as audiovisual recontextualizations that are given new meaning, e.g., via collaborative social communities or for individual pro- motional purposes. This is elaborated on throughout a discussion on Mashups as a mode of everyday bricolages, which are moreover discussed through a theoretical approach to Mashups as exponents of what has been called “Vernacular Creativity”. The article also argues that the novelty of Mashups is not be found in its formal characteristic, but rather in its social and communicative abilities within the YouTube community. This leads to the article’s overall argument that the main characteristic of the YouTube Mashup can be explained in terms of connectivity. It is argued that Mashups reveal a double articulation of connectivity; one that involves the social mechanisms of the Mashups, and another mode, which concerns the explicit embedding of structural connectivity that accentuates the medium-specific infrastructure of YouTube. This double articulation of connectivity is furthermore elaborated on by including Grusin and Bolter’s concept of remediation. Methodologically, the article draws on empirical observations and examples of Mashups are included to demonstrate the article’s main arguments. Keywords: YouTube, mashups, connectivity, remediation, social media, vernacular creativity Introduction On YouTube, a culture of audiovisual expressions has emerged that I will characterize here as the Mashup culture of YouTube. Mashups are videos that have their origin in the music sampling culture and are considered recontexualizations of already existing materials (cf.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Toolkit for March Fraud Prevention Month 2018 Middle Agers
    Toolkit for March Fraud Prevention Month 2018 Middle Agers FRAUD: Recognize. Reject. Report. Table of Contents Introduction ‐‐‐ 3 RCMP Videos ‐‐‐ 4 OPP Fraud Prevention Videos ‐‐‐ 4 Competition Bureau Fraud Prevention Videos ‐‐‐ 4 CAFC Logo ‐‐‐ 4 Calendar of Events ‐ Facebook and Twitter ‐‐‐ 5 Statistics ‐‐‐ 6 Theme 3: Scams Targeting Middle Agers ‐‐‐ 7 Service ‐‐‐ 7 Extortion ‐‐‐ 7 Personal Information ‐‐‐ 8 Loan ‐‐‐ 8 Investment ‐‐‐ 9 Text Message ‐‐‐ 10 2 Introduction In preparation for March Fraud Prevention Month, the Canadian Anti‐Fraud Centre (CAFC) has compiled a toolkit specifically designed for middle aged Canadians to further raise awareness and help prevent victimization. We encourage all partnering organizations to use the CAFC logo, contact points and resource materials in this toolkit on their website, in print and on their social media platforms. The CAFC will actively be posting on Facebook and Twitter daily (#FPM2018, #MPF2018) and participating in the fraud chats: Use the following hashtag – #fraudchat – to join. The CAFC is Canada’s central repository for data, intelligence and resource material as it relates to mass marketing fraud and identity fraud. Victims who report to the CAFC are also encouraged to report directly to their local police. The CAFC does not conduct investigations but provides valuable assistance to law enforcement agencies all over the world by identifying connections among seemingly unrelated cases. Your information may provide the piece that completes the puzzle. The CAFC is a support agency to law enforcement. Middle Aged consumers can report directly to the CAFC by calling toll free 1‐888‐495‐8501 or online through the CAFC Online Fraud Reporting System (FRS).
    [Show full text]
  • Young Adults 2021-02-15
    2021 Fraud Prevention Toolkit – Young Adults 2021-02-15 YOUNG ADULTS 2021 Fraud Prevention Toolkit Table of Contents Introduction --- 3 RCMP Videos --- 4 OPP Videos --- 4 Competition Bureau of Canada Videos --- 4 CAFC Fraud Prevention Video Playlists --- 4 CAFC Logo --- 4 Calendar of Events --- 5 About the CAFC --- 7 Statistics --- 7 Reporting Fraud --- 8 Most Common Frauds Targeting Young Adults --- 8 • Identity Theft & Fraud --- 9 • Extortion --- 10 • Investments --- 11 • Job --- 12 • Merchandise --- 13 Young Adults 2 Introduction As fraud rates continue to increase in Canada, the world is going through a global pandemic. The COVID-19 has created an environment that is ripe for fraud and online criminal activity. The COVID-19 has resulted in never-before-seen numbers of people turning to the internet for their groceries, everyday shopping, banking and companionship. Coupled with the profound social, psychological and emotional impacts of COVID-19 on people, one could argue that the pool of potential victims has increased dramatically. March is Fraud Prevention Month. This year’s efforts will focus on the Digital Economy of Scams and Frauds. The Canadian Anti-Fraud Centre (CAFC) has compiled a toolkit specifically designed for young adult Canadians (born 1987-2005) to further raise public awareness and prevent victimization. We encourage all our partner to use the resources in this toolkit on their website, in print and on their social media platforms. Throughout the year, the CAFC will be using the #kNOwfraud and #ShowmetheFRAUD descriptors to link fraud prevention messaging. We will also continue to use the slogan “Fraud: Recognize, Reject, Report”. During Fraud Prevention Month, the CAFC will post daily on its Facebook and Twitter platforms (#FPM2021).
    [Show full text]
  • National Trading Standards – Scams Team Review
    EUROPE National Trading Standards – Scams Team Review Jeremy Lonsdale, Daniel Schweppenstedde, Lucy Strang, Martin Stepanek, Kate Stewart For more information on this publication, visit www.rand.org/t/RR1510 Published by the RAND Corporation, Santa Monica, Calif., and Cambridge, UK R® is a registered trademark. © Copyright 2016 National Trading Standards RAND Europe is an independent, not-for-profit policy research organisation that aims to improve policy and decisionmaking in the public interest through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the sponsor. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org www.rand.org/randeurope Table of Contents Table of Contents ......................................................................................................................... 3 Preface .......................................................................................................................................... 5 Summary ...................................................................................................................................... 7 1 Introduction ........................................................................................................................
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • Gangs Beyond Borders
    Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Message from the Attorney General California is a leader for international commerce. In close proximity to Latin America and Canada, we are a state laced with large ports and a vast interstate system. California is also leading the way in economic development and job creation. And the Golden State is home to the digital and innovation economies reshaping how the world does business. But these same features that benefit California also make the state a coveted place of operation for transnational criminal organizations. As an international hub, more narcotics, weapons and humans are trafficked in and out of California than any other state. The size and strength of California’s economy make our businesses, financial institutions and communities lucrative targets for transnational criminal activity. Finally, transnational criminal organizations are relying increasingly on cybercrime as a source of funds – which means they are frequently targeting, and illicitly using, the digital tools and content developed in our state. The term “transnational organized crime” refers to a range of criminal activity perpetrated by groups whose origins often lie outside of the United States but whose operations cross international borders. Whether it is a drug cartel originating from Mexico or a cybercrime group out of Eastern Europe, the operations of transnational criminal organizations threaten the safety, health and economic wellbeing of all Americans, and particularly Californians.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Malware Xiaowei Yang Previous Lecture
    590.05 Lecture 5: Malware Xiaowei Yang Previous lecture • Accountability • OS security Today • Malware Malware: Malicious Software 10/21/13 Malware 4 Viruses, Worms, Trojans, Rootkits • Malware can be classified into several categories, depending on propagaon and concealment • Propagaon 10/21/13 • Virus: human-assisted propagaon (e.g., open email aachment) • Worm: automac propagaon without human assistance Malware • Concealment • Rootkit: modifies operang system to hide its existence • Trojan: provides desirable funcBonality but hides malicious operaon • Various types of payloads, ranging from annoyance to crime 5 Insider Attacks • An insider a)ack is a security breach that is caused or facilitated by someone who is a part of the very organizaon that controls or builds the asset that should be protected. • In the case of malware, an insider aack refers to a security 10/21/13 hole that is created in a soXware system by one of its programmers. Malware 6 Backdoors • A backdoor, which is also someBmes called a trapdoor, is a hidden feature or command in a program that allows a user to perform acBons he or she would not normally be allowed to do. • When used in a normal way, this program performs completely as 10/21/13 expected and adverBsed. • But if the hidden feature is acBvated, the program does something Malware unexpected, oXen in violaon of security policies, such as performing a privilege escalaon. • Benign example: Easter Eggs in DVDs and soXware An Easter egg is an intenBonal inside joke, hidden message, or feature in a work such as a computer program, movie, book, or 7 crossword.
    [Show full text]
  • A/74/130 General Assembly
    United Nations A/74/130 General Assembly Distr.: General 30 July 2019 Original: English Seventy-fourth session Item 109 of the provisional agenda* Countering the use of information and communications technologies for criminal purposes Countering the use of information and communications technologies for criminal purposes Report of the Secretary-General Summary The present report has been prepared pursuant to General Assembly resolution 73/187, entitled “Countering the use of information and communications technologies for criminal purposes”. In that resolution, the General Assembly requested the Secretary-General to seek the views of Member States on the challenges that they faced in countering the use of information and communications technologies for criminal purposes and to present a report based on those views for consideration by the General Assembly at its seventy-fourth session. The report contains information on the views of Member States submitted pursuant to the aforementioned resolution. __________________ * A/74/150. V.19-08182 (E) 190819 200819 *1908182* A/74/130 Contents Page I. Introduction ................................................................... 4 II. Replies received from Governments ............................................... 4 Argentina ..................................................................... 4 Armenia ...................................................................... 6 Australia ..................................................................... 8 Austria ......................................................................
    [Show full text]
  • Institutions for Cyber Security: International Responses and Data Sharing Initiatives Nazli Choucri Stuart Madnick Priscilla Koepke
    Institutions for Cyber Security: International Responses and Data Sharing Initiatives Nazli Choucri Stuart Madnick Priscilla Koepke Working Paper CISL# 2017-06 April 2017 Cybersecurity Interdisciplinary Systems Laboratory (CISL) Sloan School of Management, Room E62-422 Massachusetts Institute of Technology Cambridge, MA 02142 Institutions for Cyber Security: International Responses and Data Sharing Initiatives Nazli Choucri Stuart Madnick Priscilla Koepke Department of Political Sloan School of Management, Sloan School of Science, MIT MIT Management, MIT [email protected] [email protected] [email protected] August 2016 (Updated April 2017) Abstract Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed world and increasingly for people in in the developing world. This paper seeks to provide an initial baseline, for representing and tracking institutional responses to a rapidly changing international landscape, real as well as virtual. We shall argue that the current institutional landscape managing security issues in the cyber domain has developed in major ways, but that it is still “under construction.” We also expect institutions for cyber security to support and reinforce the contributions of information technology to the development process. We begin with (a) highlights of international institutional theory and an empirical “census” of the institutions-in-place for cyber security, and then turn to (b) key imperatives of information technology-development linkages and the various cyber processes that enhance developmental processes, (c) major institutional responses to cyber threats and cybercrime as well select international and national policy postures and so critical for industrial countries and increasingly for developing states as well, and (d) the salience of new mechanisms designed specifically in response to cyber threats.
    [Show full text]
  • RAO BULLETIN 1 October 2019
    RAO BULLETIN 1 October 2019 PDF Edition THIS RETIREE ACTIVITIES OFFICE BULLETIN CONTAINS THE FOLLOWING ARTICLES Pg Article Subject . * DOD * . 04 == NDAA 2020 [21] ---- (OCT 1 Timeline Not Likely) 05 == NDAA 2020 [22] ---- (Military Coalition Letter to Congress) 06== Air Force Standing ---- (Eroding Air Superiority Advantage) 06 == Trump Border Wall [02] ---- (Pentagon | $2.5B in Contracts Finalized) 07 == Afghan War ---- (How Americans Are Split Over Whether It Was a Mistake) 08 == Arlington National Cemetery [82] ---- (New Burial Eligibility Criteria Proposed) 09 == DOD Pain Rating [02] ---- (New Scale for Assessing Patients' Misery) 10 == POW/MIA Recoveries & Burials ---- (Reported 16 thru 30 SEP 2019 | Fourteen) . * VA * . 12 == VA National Suicide Prevention Report ---- (2019 Report Released) 13 == VA Flu Shots [06] ---- (Two Options to Get Your Shot) 14 == VA Debt [07] ---- (Collection Systems Leave Vets Confused, Frustrated) 15 == VA Rating Decisions ---- (Initial, Deferred, & Confirmed and Continued) 16 == VA Disability Ratings [04] --- (Protected) 16 == VA Hospital Harassments/Assaults ---- (Troubling Series Occurring at VA Facilities) 18 == VA Reexamination Notice ---- (How the VA Can Reduce Disability Benefits) 19 == VA Caregiver Program [58] ---- (Support Services Offered to Caregivers) 1 | P a g e 20 == VA Caregiver Program [59] ---- (Bogged Down by Bad Data, IT Issues, GAO Finds) 21 == VA Caregiver Program [60] ---- (Expanded to All vice Just Post 911 Vets) 22 == Emergency Medical Bill Claims [06] ---- (How Will VA Comply
    [Show full text]