experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

New Draft of House CISPA Bill
The House Intelligence Committee has released a new draft of the Cybersecurity Intelligence Sharing and Protection Act. I think it is fair to say that the bill is becoming increasingly more moderate as it goes through iterations. As originally…

Thinking About Cybersecurity — A Video Course
I hope you will forgive me a bit of self-congratulation. Today, The Great Courses released a video course that I did for them entitled Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare. The course is a less academic but visually…

Building a Cyber Liability System
Those who follow the blog will know that I am skeptical of the government’s ability to construct a regulatory system for enhancing cybersecurity standards. I am often asked, however: “well, then what do you support?” I am pleased to finally have a…

A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace
The U.S. faces significant cybersecurity threats that jeopardize America’s critical infrastructure, the freedoms that Americans exercise online, and the economic viability of U.S. businesses. The cybersecurity status quo is unstable, especially when…

The =Real= Internet Kill Switch
Last year, as Congress debated cybersecurity, some worried about an “internet kill switch” — that is, the authority for the President to order access to the internet cut off. As the debate resumes this year, it is worth remembering the real nature…

Visualizing Cyber Intrusions
I was really struck by Raffa’s post last week on how to visualize Senator Paul’s drone filibuster. It reminded me of the truth I learned long ago in a class taught by Ed Tufte — that a good picture with data is usually worth 100o words of prose.…

The Donilon Approach to Cybersecurity
First, we need a recognition of the urgency and scope of this problem and the risk it poses—to international trade, to the reputation of Chinese industry and to our overall relations. Second, Beijing should take serious steps to investigate and put a…

Cybersecurity Resources
On a good day, cybersecurity is the topic that keeps on giving. Today is one of those days. I just received a copy of the CRS report, Cybersecurity: Authoritative Reports and Resources which is, as its name suggests, a compendium (essentially a…

Federalist Society Teleforum on Chinese Cyber Hacking Tomorrow
For those of our readers who are members of the Federalist Society, its next “teleforum” conference call is tomorrow (Tuesday 3/12) at 2 p.m. (EST) on the subject of “Cybersecurity And the Chinese Hacker Problem.” The three panelists are Richard…

US v. Cotterman — Laptop Searches at the Border Require “Reasonable Suspicion”
Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland security/border issues. The Ninth Circuit sitting en banc has decided US v. Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland…