October 12, 2012

  • arXiv [preprints – selected new articles]:
  • Denbow, S., & Hertz, J. (2012). Pest control: Taming the RATs [Matasano]. [Read]
  • European Network and Information Security Agency. (2012, Oct. 11). Annual incident report 2011. [Read]
  • Hoofnagle, C. J., Urban, J. M., & Li, S. (2012, Oct. 8). Privacy and modern advertising: Most US internet users want ‘do not track’ to stop collection of data about their online activities [preprint]. [Read / More from NYT]
  • IEEE Security & Privacy – new issue [full text]:
  • IEEE Transactions on Dependable & Secure Computing – new issue / preprints [full text]:
  • Martinez, J. (2012, Oct. 10). FCC chairman warns telecomm treaty would ‘threaten the internet’. The Hill. [Read]
  • McCullagh, D. (2012, Oct. 9). Military court to review tight secrecy in Bradley Manning case. CNET. [Read]
  • Nakashima, E. (2012, Oct. 9). Iran aids Syria in tracking tracking opposition via electronic surveillance, U.S. officials say. Washington Post. [Read / Also this week: Lieberman on cyber attacks]
  • Oulasvirta, A., Pihlajamaa, A., Perkiöm, J., Ray, D., Vähäkangas, T., Hasu, T., Vainio, N., & Myllymäki, P. (2012). Long-term effects of ubiquitous surveillance in the home [preprint]. [Read]
  • Ramakers, R., Vanackenm D., Luyten, K., Coninx, K., & Schöning, J. (2012). Carpus: A non-intrusive user identification technique for interactive surfaces. Paper presented at the 25th Annual ACM Symposium on User Interface Software and Technology. [Read]
  • Roberts, P. (2012, Oct. 12). Exploit code released for software used to manage solar energy plants. Naked Security. [Read]
  • Ross, B. (2012, Oct. 9). Did the CIA have a double agent inside al Qaeda? [RE: alleged source of infected USB drive that facilitated killing of Anwar al-Awaki]. ABC News. [Read]
  • Security & Communication Networks – new preprints [Abstracts /Request articles]
  • Silver, V. (2012, Oct. 10). Spyware leaves trail to beaten activist through Microsoft flaw [RE: the UAE’s Ahmed Mansoor]. Bloomberg. [Read / More: University of Toronto / NYT]
  • Thompson, M. (2012, Oct. 12). Panetta sounds alarm on cyber-war threat. Time. [Read].
  • U.S. Chamber of Commerce. [Brief: Response to Federal Trade Commission on corporate data security accountability]. [Read]
  • United States. Congress. House. Permanent Select Committee on Intelligence. (2012, Oct. 8). Investigative report on the U.S. national security issues posed by Chinese telecommunications companies Huawei and ZTE. [Read]
  • United States. Department of Defense. (2012, Oct). [Documents related to funding of Tor Project, via Cryptome]. [Read]
  • United States. Department of Homeland Security. Industrial Control Systems Cyber Emergency Response Team. (2012, Oct. 11). ICS-CERT monthly monitor. [Read]
  • United States. Department of Justice. Office of the Inspector General. (2012, September).  Report to Congress on implementation of Section 1001 of the USA PATRIOT Act [FBI surveillance under DOJ investigation]. [Read]
  • United States. Executive Office of the President. (2012, Oct. 10). Presidential Policy Directive / PPD-19: Protecting whistleblowers with access to classified information. [Read]
  • United States. Federal Bureau of Investigation. (2012, Oct. 10). [FBI Data Warehouse System exempted from Privacy Act safeguards]. [Read – scroll to bottom].
  • United States. Government Accountability Office. (2012, September – newly released). Mobile device location data: Additional federal actions could help protect consumer privacy. [Read]
  • Warner, M. (2012). Cybersecurity: A pre-history. Intelligence & National Security. [Abstract / Request article]


  • 2012 Symposium on Visualization for Cybersecurity. (2012, Oct. 15) – papers presented [full text]:

Calls for Papers




Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: