experts and translators of the new domain
Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.
Visualizing Cyber Intrusions
I was really struck by Raffa’s post last week on how to visualize Senator Paul’s drone filibuster. It reminded me of the truth I learned long ago in a class taught by Ed Tufte — that a good picture with data is usually worth 100o words of prose.…
The Donilon Approach to Cybersecurity
First, we need a recognition of the urgency and scope of this problem and the risk it poses—to international trade, to the reputation of Chinese industry and to our overall relations. Second, Beijing should take serious steps to investigate and put a…
Cybersecurity Resources
On a good day, cybersecurity is the topic that keeps on giving. Today is one of those days. I just received a copy of the CRS report, Cybersecurity: Authoritative Reports and Resources which is, as its name suggests, a compendium (essentially a…
Federalist Society Teleforum on Chinese Cyber Hacking Tomorrow
For those of our readers who are members of the Federalist Society, its next “teleforum” conference call is tomorrow (Tuesday 3/12) at 2 p.m. (EST) on the subject of “Cybersecurity And the Chinese Hacker Problem.” The three panelists are Richard…
US v. Cotterman — Laptop Searches at the Border Require “Reasonable Suspicion”
Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland security/border issues. The Ninth Circuit sitting en banc has decided US v. Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland…
House Committee Jurisdiction and CISPA
Last year, the House Intelligence Committee passed out a bill, the Cyber Intelligence Sharing and Protection Act (CISPA) that eventually was adopted with bipartisan support in the House of Representatives. The bill drew a veto threat from President…
Cybersecurity Readings: Crowdsourcing Cybersecurity
Gary Shiffman and Ravi Gupta have written an interesting new article: “Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons.” From the abstract:Individuals increasingly rely upon the internet for…
Cyber in the Heart of Darkness
One of the most notable challenges in dealing with cybersecurity is the difficulty of adequately conveying the scope and size of cyberspace. It’s easy to say that there are nearly 2.5 billion internet users in the world (35% of the world’s…
Obama’s Cybersecurity Executive Order Falls Short
In his State of the Union address, President Obama announced that he had signed an executive order (EO) on cybersecurity. The order uses a standard-setting approach to improve cybersecurity. However, such a model will only impose costs, encourage…
President Obama’s Cyber Executive Order
As Rafaella reported last night, President Obama went “all-in” on cybersecurity last night, marrying a substantive mention of cyber in his State of the Union address (I’m bitter about that — I bet against it, which shows you how valuable my…