experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

No, DHS is Not Going to “Take Over” the Electoral System
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…

On the Utility of Transparency through Disclosure of Software Bugs
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Android phone in the garbage and he asked, somewhat…

The Wages of Information Sharing Sin
What is worse than the Federal government having actionable confidential information that it doesn’t share with state and local governments, even though that information could assist them? How about sharing that information only to turn around and…

CYBERCOM Grows Up, Chinese IP Theft, and Apple’s Bug Bounty
A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: A few days at the beach see a number of interesting (and as yet unremarked in Lawfare) cyber items: he Obama administration is preparing to elevate…

Rethinking the Doctrine of Homeland Security – Reflections on Orlando
Almost everything we think we know about homeland security is outdated. Almost everything we think we know about homeland security is outdated. If the lessons of Paris (twice), Brussels, San Bernardino, Orlando, Istanbul (just yesterday), Sony, the…

Apparently The Word “Foolish” Is Spelled “SWIFT”
It is difficult to shock people these days. Especially in the cybersecurity realm we have seen so many different foolish ways of being vulnerable that one becomes inured to it. As Kevin Mittnick is reported to have said once: “There is no patch for…

Strategic Planning for a More Secure Network
As we move toward a presidential election, the question arises: what should the next President (whoever he or she may be) do about cybersecurity? It is a sufficiently salient question that President Obama has chartered a commission, whose basic…

Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program
Section 702 of the Foreign Intelligence Surveillance Act (FISA) will, in its current form, come up for reauthorization in 2017. Broadly speaking, the Section 702 program targets non-U.S. persons reasonably believed to be located outside the United…

President Obama Names Members of Commission on Enhancing National Cybersecurity
The President had previously named Tom Donilon and Sam Palmisano as Co-chairs. Today, he announced the members of the panel, including our own Herb Lin. Congrats Herb. The Commission is due to file a report by December and will have its first meeting…

How Concerned Should We Be about IoT Vulnerability?
In 2006, when the Office of the Director of National Intelligence provided its first “Annual Threat Asssessment” top billing went to the “Global Jihadist Threat.” Rounding out the top three concerns, Director Negroponte mentioned the then-ongoing…