experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Cybersecurity Passes
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was the proposal to eliminate DHS’s status as the…

Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…

The FTC Takes Charge — FTC v. Wyndham
As Wells reported Monday, the Third Circuit has issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp. Readers may recall the background of the case. Wyndham was hacked by a Russian criminal gang who stole a host of personally…

Users Weigh in on What Database the PLA Should Hack Next
The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…

Unclassified Databases for the Chinese Part II
Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…

Encryption, Biometrics, and the Status Quo Ante
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…

CISA Agonistes
The Cybersecurity Information Sharing Act of 2015 passed out of the Intelligence Committee by a 14-1 vote. With that passage, and the House adopton of two similar bills in April, some of us had begun to hope that the long-awaited passage of…

The OPM Data Breach: Raising All Sorts of Government Enforcement and Privacy Protection Questions
Reports that China (most likely) has breached Office of Personnel Management (OPM) systems and stolen personal information (PI) of over four million current and/or former federal employees raises all sorts of questions regarding the government’s…

Saving Internet Freedom
Table of Contents In the space of barely 20 years, the world has been changed immeasurably by the advent of the Internet and other communications technologies. These breathtaking advances have not only expanded the economy but have improved the…
Administration Loves RSA; Does It Get Love Back?
Last week was the annual RSA convention in San Francisco, the premier convention of cybersecurity professionals in America each year. This year the largest crowd ever gathered at the Moscone Center, and the Obama Administration was out in force. It…