text
stringlengths
0
118
Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach Harms,
96 Tex. L. Rev. 737 (2018).
58.
In re Barnes & Noble Pin Pad Litig., No. 12–cv–8617, 2013 WL 4759588, at *5 (N.D. Ill. Sept.
3, 2013).
59.
Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach Harms,
96 Tex. L. Rev. 737, 767–773 (2018).
60.
Id.
61.
Id. at 42.
62.
Id.
63.
Reilly v. Ceridian Corp., 664 F.3d 38 (3d Cir. 2011).
64.
Clapper v. Amnesty International USA, 133 S. Ct. 1138 (2013).
65.
In re Sci. Applications Int’l Corp. (SAIC) Backup Tape Data Theft Litig., 45 F.Supp.3d 14
(D.D.C. 2014).
66.
Id.
67.
Id.
68.
Remijas v. Neiman Marcus Group, 794 F.3d 688, 695 (7th Cir. 2015).
69.
Id.
70.
See Spokeo, Inc. v. Robins, 136 S. Ct. 1540, 1549-50 (2016).
71.
In re Ashley Madison Customer DataSec. Breach Litig., MDL No. 2669 (E.D. Mo. Nov. 20,
2017).
72.
In re Anthem, Inc. Data Breach Litig., No. 15-02617 (N.D. Cal. prelim. approval June 23,
2017).
CHAPTER 4
1.
For the original in-depth reporting of this story, see Lorenzo Franceschi-Bicchierai, The SIM
Hackers, (July 17, 2018), https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-
swapping-steal-phone-numbers-instagram-bitcoin/.
2.
Id.
3.
Id.
4.
Bruce
Schneier,
Sim
Hijacking,
Schneier
on
Security,
(Jan
21,
2020),
https://www.schneier.com/blog/archives/2020/01/sim_hijacking.html.
5.
See Derek E. Bambauer, Ghost in the Network, 162 U. Pa. L. Rev. 1011, 1012 (2014) (arguing
that that because successful attacks are unavoidable, cybersecurity should focus on mitigating
breaches rather than preventing them); Deirdre K. Mulligan & Fred B. Schneider, Doctrine for
Cybersecurity, Daedalus, Fall 2011, at 70 (“[A]bsolute cybersecurity is worthwhile but unlikely
ever to be achieved. For systems that incorporate humans as users and operators, we would
need some way to prevent social engineering and intentional insider-malfeasance. Prevention,
here, requires overcoming the frailty of humans, which is likely to involve more than
technology.”).
6.
Guido Calabresi, The Gift of the Evil Deity, in Ideals, Beliefs, and Attitudes in the Law(1985).
7.
See Ido Kilovalty, Legally Cognizable Manipulation, 34 Berkeley Tech. L. J. (2019).
8.
For more information on the misguided attempt to force a particular kind of password
complexity, see Thaw, Stovepiping, supra.
9.
See, e.g., C. Herley and P. C. v. Oorschot, SoK: Science, Security and the Elusive Goal of
Security as a Scientific Pursuit, 2017 IEEE Symposium on Security and Privacy (SP), San Jose,
CA,
2017,
pp.
99–120,
http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7958573&isnumber=7958557.
10.
See, e.g., Cybersecurity Requirements for Financial Services Companies, 23 CRR-NY § 500.2
(“Each covered entity shall maintain a cybersecurity program designed to protect the
confidentiality, integrity and availability of the covered entity’s information systems.”); Jeff
Kosseff, Defining Cybersecurity Law, 103 Iowa L. Rev. 985, 988–989 (2018).
11.
Take
your
Free
Cybersecurity
Self-Assessment,
Microsoft,
https://www.microsoft.com/cyberassessment/en (“Our Certified Microsoft Cybersecurity
Experts collaborated to create a personalized Cybersecurity Healthcheck covering more than 20
security points in 4 of our key Cybersecurity categories.”) (last accessed December 15, 2020).
12.
Good