![]() ![]() ![]() Surely using procured ‘evidence’ to provide an unfair competitive business advantage to some select corporations is breaking some other law(s) too… RICO, perhaps? I do know if I were a competitor of FireEye or Fox-IT, I’d be fuming mad at the DOJ/FBI… It’s a good thing their service is provided free of charge, but you can’t say there’s no value in this kind of free publicity! Subsection (a)(7) defines the term “routine use” to mean “with respect to the disclosure of a record, the use of such record for a purpose which is compatible with the purpose for which it was collected.”īut, that would have required an advanced notice to be published in the Federal Register… I’m not sure who would have standing to sue, it seems that they are treating this as a separate case from the Zeus botnet prosecution. Subsection (e)(4)(D) requires Federal Register publication of “each routine use of the records contained in the system, including the categories of users and the purpose of such use.” “for a routine use as defined in subsection (a)(7) of this section and described under subsection (e)(4)(D).” ![]() ![]() … By my reading, this could have possibly been allowed under the “routine use” exemption … “No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains. Department of Justice)Ĭonditions of Disclosure to Third PartiesĪ. Overview of the Privacy Act of 1974 ( 2012 – U.S. Is this legal under the Privacy Act of 1974, for instance? The law enforcement actions against Cryptolocker are the result of an ongoing criminal investigation by the FBI’s Washington Field Office, in coordination with law enforcement counterparts from Canada, Germany, Luxembourg, the Netherlands, United Kingdom and Ukraine. In addition to the disruption operation against Gameover Zeus, the Justice Department led a separate multi-national action to disrupt the malware known as Cryptolocker (sometimes written as “CryptoLocker”), which began appearing about September 2013 and is also a highly sophisticated malware that uses cryptographic key pairs to encrypt the computer files of its victims. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator ( June 2, 2014) Any legal muckrakers wanna have a go at this one? It’s looking likely to me that this convenient little DecryptCryptoLocker service is operating in opposition of the law… (See also: this blog post) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |