experts and translators of the new domain
Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.
China’s National Cybersecurity Strategy
Earlier today, the Chinese government released its National Cybersecurity Strategy. A government news agency report on the release is here. According to the report: “China’s top Internet regulator released a cyberspace security strategy on Tuesday,…
Why Cybersecurity Is So Hard—Absurd Division
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…
No, DHS is Not Going to “Take Over” the Electoral System
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…
On the Utility of Transparency through Disclosure of Software Bugs
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Android phone in the garbage and he asked, somewhat…
The Wages of Information Sharing Sin
What is worse than the Federal government having actionable confidential information that it doesn’t share with state and local governments, even though that information could assist them? How about sharing that information only to turn around and…
CYBERCOM Grows Up, Chinese IP Theft, and Apple’s Bug Bounty
A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: he Obama administration is preparing to elevate…
Rethinking the Doctrine of Homeland Security – Reflections on Orlando
Almost everything we think we know about homeland security is outdated. Almost everything we think we know about homeland security is outdated. If the lessons of Paris (twice), Brussels, San Bernardino, Orlando, Istanbul (just yesterday), Sony, the…
Apparently The Word “Foolish” Is Spelled “SWIFT”
It is difficult to shock people these days. Especially in the cybersecurity realm we have seen so many different foolish ways of being vulnerable that one becomes inured to it. As Kevin Mittnick is reported to have said once: “There is no patch for…
Strategic Planning for a More Secure Network
As we move toward a presidential election, the question arises: what should the next President (whoever he or she may be) do about cybersecurity? It is a sufficiently salient question that President Obama has chartered a commission, whose basic…
Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program
Section 702 of the Foreign Intelligence Surveillance Act (FISA) will, in its current form, come up for reauthorization in 2017. Broadly speaking, the Section 702 program targets non-U.S. persons reasonably believed to be located outside the United…