Indiana laws permit public officials to use personal email accounts for government business, so it does not appear that vice-president Mike Pence violated any laws when he opted to use his personal AOL account to communicate sensitive governmental information; however, he certainly thwarted the state's open records laws, and also exposed that information to hackers who made off with it.
Pence's office in Washington said in a written statement Thursday: "Similar to previous governors, during his time as Governor of Indiana, Mike Pence maintained a state email account and a personal email account. As Governor, Mr. Pence fully complied with Indiana law regarding email use and retention. Government emails involving his state and personal accounts are being archived by the state consistent with Indiana law, and are being managed according to Indiana’s Access to Public Records Act.”
Indiana Gov. Eric Holcomb's office released 29 pages of emails from Pence's AOL account, but declined to release an unspecified number of others because the state considers them confidential and too sensitive to release to the public.
That's of particular concern to Justin Cappos, a computer security professor at New York University's Tandon School of Engineering. “It’s one thing to have an AOL account and use it to send birthday cards to grandkids," he said. "But it’s another thing to use it to send and receive messages that are sensitive and could negatively impact people if that information is public.”
Pence used personal email for state business — and was hacked
(Images: Mike Pence, Gage Skidmore, CC-BY-SA)
Nearly two weeks after the city of Baltimore's internal networks were compromised by the Samsam ransomware worm (previously), the city is still weeks away from recovering services -- that's weeks during which the city is unable to process utility payments or municipal fines, register house sales, or perform other basic functions of city governance.
Google has published the results of a study of the efficacy of standard anti-account-hijacking techniques like two-factor authentication (2FA), secret questions, and passwords: the good news is that when these are used, they are incredibly effective at stopping both automated and targeted attacks, including "advanced" attacks of the sort that are often characterized as unstoppable.
In 2014, Quentin Tarantino sued Gawker for publishing a link to a leaked pre-release screener of his movie "The Hateful Eight." The ensuing court-case revealed that the screeners Tarantino's company had released had some forensic "traitor tracing" features to enable them to track down the identities of people who leaked copies.
Does your gaming setup need an upgrade? No need to wait for Christmas. We’ve rounded up the latest tech accessories for your favorite video game platforms. All of them are already sale priced, but you can knock an additional 15% off the final price for Memorial Day by using the online code WEEKEND15. Audeze Mobius […]
Raspberry Pi is one of the world’s most versatile open-source computers. Alexa is a home automation hub with limitless potential. Together, they’re a dream team for ambitious makers, opening the door to everything from automatic lights to voice-controlled robots. Learning Raspberry Pi is meant to be relatively easy for newbies, but its applications with Alexa […]
Heads up: The clock is winding down on a free-entry contest to win not only one of the best smartphones on the market but a handy pair of earbuds. A simple sign-up is all you need to be eligible to win a 256 GB iPhone XS Max, along with AirPods. And while “free” is tough […]