experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Reforming DHS: Missed Opportunity Calls for Congress to Intervene
Late last year, President Barack Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. One of the side effects of that announcement…

The Administration’s Cyber Proposals — Information Sharing
As part of the run-up to the State of the Union address next week, the Administration has been releasing publicly some of its policy proposals. One of the most notable suite of proposals involved new legislation relating to cybersecurity. The…
The CENTCOM Twitter Hack
By now, most readers of this blog are well aware that, for a brief period of time yesterday, ISIS cyber warriors (going under the hashtag #CyberCaliphate) took control of the CENTCOM Twitter and You-Tube accounts. Twitter and You-Tube are, of course,…

Cyber Supply Chain Security
There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of software liability, which would, drive safer code. There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of…

Pass Phrases Protected; Fingerprints Not — Curiouser and Curiouser
The House of Representatives has passed the Cybersecurity Intelligence Sharing and Protection Act, by a vote of 288-127. This happened after several amendments were adopted (most notably one offered by Rep. The House of Representatives has passed the…

Continuing Federal Cyber Breaches Warn Against Cybersecurity Regulation
Recent high-profile private-sector hacks have once again put a spotlight on the issue of cybersecurity.[1] This is a serious problem that requires legislation to improve the United States’ cybersecurity posture, but the U.S. should not reflexively…

Whistleblowers, Leaks and the Media: The First Amendment and National Security
A comprehensive examination of national security laws and the tensions between the public's right to know, and the government's right to protect its interests. A compilation of thoughtful essays that look at the constitutional foundations and limitations of the U.S....

Neustar? What’s a Neustar?
Today’s New York Times opened with an above-the-fold story entitled “Spy Agencies Urge Caution on Phone Deal.” The Wall Street Journal had a similar report, about “Security Concerns Arise with Phone Database Contract.” The gravamen of both articles…

The Encryption Wars Continue
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…

Cyber Jumps The Shark
To “jump the shark” is a symbol for when a phenomenon (usually a TV show) reaches its apex and begin declining in quality. It’s named after a famous “Happy Days” episode where Fonzie gets on a water skis and actually jumps over a shark. Though…