Ten tools every cyber cop needs

Author: William "Bud" Roth

Categories: Cyber beat

What tools are necessary for law enforcement officers to successfully convict cybercriminals? In this presentation, William “Bud” Roth, Non-Resident Fellow for Cybersecurity at Sasakawa USA, details a capability assessment model for computer crime.

Tags: , , , , , , , , , , ,

Deputizing private sector cybersecurity firms to fight cyber crime

Author: William “Bud” Roth

Categories: Cyber beat, Sasakawa USA Blog

In 2015, U.S. businesses suffered an estimated 150 successful hacks per week, with an average cleanup cost of $6.5m, writes Sasakawa USA’s William “Bud” Roth, who proposes the government can compensate for the lack of capacity by deputizing members of the private sector.

Tags: , , , , , , , , , , , , , , ,

It’s time to treat Bitcoin ransom as stolen goods

Author: William "Bud" Roth

Categories: Cyber beat, Sasakawa USA Blog

There has been a lot of legal debate about whether Bitcoin is a currency, a security, or a commodity. That judgement will ultimately determine whether Bitcoins used to pay ransom are treated as stolen money (fungible) or stolen goods (reclaimable). Law enforcement should treat Bitcoin as a commodity and, in doing so, the victims of ransomware who pay would have recourse against all future owners of the ransomed Bitcoins to reclaim them.

Tags: , , , , , , , , , , , , , , , , , , , ,

Ethical hacker

What Do You Mean, “Ethical” Hacker?

Author: Graham Cadwell Dietz

Categories: Cyber beat, Sasakawa USA Blog

Ethical hackers are helpful, certified security professionals. Ethical hacking is an established security. Japan’s METI is smart to leverage it.

Tags: , , , , , , , , , , , , , , , , ,

Patching human OS: End users matter in cybersecurity

Author: Graham Cadwell Dietz

Categories: Cyber beat, Sasakawa USA Blog

When public figures talk about combatting cyberterrorism and protecting networked infrastructure, they may envision technical solutions with stronger firewalls, better encryption, and more stringent password requirements. But changes in culture and practices on networked devices are also very important, if perhaps more difficult, in reducing risk from security incidents.

Tags: , , , , , , , , , , , , , , , , , , , ,