text
stringlengths
0
118
Riley, Missed Alarms.
4.
Riley, Missed Alarms.
5.
Riley, Missed Alarms.
6.
Elizabeth A. Harris, Nicole Perlroth, For Target, the Breach Numbers Grow, New York Times,
(Jan. 10, 2014), available athttps://www.nytimes.com/2014/01/11/business/target-breach-
affected-70-million-customers.html?_r=0.
7.
Riley, Missed Alarms.
8.
Brian Krebs, Target Hackers Broke In Via HVAC Company, KrebsOnSecurity, (Feb. 5, 2014),
available athttps://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/.
9.
Charles Riley & Jose Pagliery, Target will pay hack victims $10 million, CNN Tech Blog, (Mar.
19, 2015), available athttp://money.cnn.com/2015/03/19/technology/security/target-data-hack-
settlement/.
10.
Charles Riley & Jose Pagliery, Target will pay hack victims $10 million, CNN Tech Blog, (Mar.
19, 2015), available athttp://money.cnn.com/2015/03/19/technology/security/target-data-hack-
settlement/; Michael Riley et al., Missed Alarms and 40 Million Stolen Credit Card Numbers:
How
Target
Blew
It,
Bloomberg
News,
(Mar.
17,
2014),
https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-
credit-card-data.
11.
Brian Krebs, Target Hackers Broke In Via HVAC Company, KrebsOnSecurity, (Feb. 5 2014),
available athttps://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/.
12.
Chris Smith, Expert who first revealed massive Target hack tells us how it happened, BGR (Boy
Genius Report), (Jan. 16, 2014), available athttp://bgr.com/2014/01/16/how-was-target-hacked/.
13.
Riley, Missed Alarms.
14.
Riley, Missed Alarms.
15.
Riley, Missed Alarms.
16.
Riley, Missed Alarms.
17.
Jim Daley, Expenses From the Home Depot and Target Data Breaches Surpass $500 million,
Digital Transactions, (May 26, 2016), http://www.digitaltransactions.net/news/story/Expenses-
From-the-Home-Depot-and-Target-Data-Breaches-Surpass-500-Million.
18.
Chris Smith, Expert who first revealed massive Target hack tells us how it happened, BGR (Boy
Genius Report), (Jan. 16, 2014), available athttp://bgr.com/2014/01/16/how-was-target-hacked/.
19.
See Brian Krebs, Ransomware for Dummies: Anyone Can Do It, KrebsOnSecurity (Mar. 1,
2017); Bill Brenner, 5 Ransomware as a Service (RaaS) Kits—SophosLabs Investigates, Naked
Security (Dec. 13, 2017), https://nakedsecurity.sophos.com/2017/12/13/5-ransomware-as-a-
service-raas-kits-sophoslabs-investigates/.
20.
Lily Hay Newman, Atlanta Spent $2.6M to Recover From a $52,000 Ransomware Scare,
Wired,
(Apr.
23,
2018),
https://www.wired.com/story/atlanta-spent-26m-recover-from-
ransomware-scare/.
21.
Chris Bodenner, How Easily Can Hackers Plant Evidence?, The Atlantic, (Sept. 11, 2015),
https://www.theatlantic.com/notes/2015/09/how-easy-can-hackers-plant-evidence/404863/.
22.
Brian Fung, A Snapchat Security Breach Affects 4.6 Million Users. Did Snapchat Drag Its Feet
on a Fix?, Wash. Post, (Jan. 1, 2014), https://www.washingtonpost.com/news/the-
switch/wp/2014/01/01/a-snapchat-security-breach-affects-4-6-million-users-did-snapchat-drag-
its-feet-on-a-fix/.
23.
See Bruce Schneir, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected
World (2018); Andrea Matwyshyn, The Internet of Bodies, 61 Wm. & Mary L. Rev. 77 (2019);
Scott Peppet, Regulating the Internet of Things: First Steps Toward Managing Discrimination,
Privacy, Security and Consent, 93 Tex. L. Rev. 85 (2014); Bryant Walker Smith, Automated
Driving and Product Liability, Michigan State Law Review, 2017 Mich. St. L. Rev. 1 (2017).
24.
Elizabeth A. Harris and Nicole Perlroth, For Target, the Breach Numbers Grow, New York
Times, (Jan. 10, 2014).
25.
Kevin McCoy, Target to Pay $18.5M for 2013 Data Breach that Affected 41 Million
Consumers, USA Today, (May 23, 2017).
26.
Privacy Rights Clearinghouse, Data Breaches, https://www.privacyrights.org/data-breaches.
27.
For a helpful guide to cybersecurity, see Steve Bellovin, Thinking Security: Stopping Next
Year’s Hackers (2016). Peter Swire has sought to make sense of the landscape of cybersecurity,
including the proper role of law and policy, by proposing a conceptual framework based on the
multiple layers of technology and organization that make up the Internet, sometimes referred to
as “the stack.” See Peter Swire, A Pedagogic Cybersecurity Framework, 61 Communications of
the ACM 23 (Oct. 2018), https://cacm.acm.org/magazines/2018/10/231364-a-pedagogic-
cybersecurity-framework/fulltext.
28.
Other important data security laws include federal statutes such as the Gramm–Leach–Bliley
Act (GLBA) and the Federal Information Security Management Act (FISMA) and state laws