experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

The =Real= Internet Kill Switch
Last year, as Congress debated cybersecurity, some worried about an “internet kill switch” — that is, the authority for the President to order access to the internet cut off. As the debate resumes this year, it is worth remembering the real nature…

Visualizing Cyber Intrusions
I was really struck by Raffa’s post last week on how to visualize Senator Paul’s drone filibuster. It reminded me of the truth I learned long ago in a class taught by Ed Tufte — that a good picture with data is usually worth 100o words of prose.…

The Donilon Approach to Cybersecurity
First, we need a recognition of the urgency and scope of this problem and the risk it poses—to international trade, to the reputation of Chinese industry and to our overall relations. Second, Beijing should take serious steps to investigate and put a…

Cybersecurity Resources
On a good day, cybersecurity is the topic that keeps on giving. Today is one of those days. I just received a copy of the CRS report, Cybersecurity: Authoritative Reports and Resources which is, as its name suggests, a compendium (essentially a…

Federalist Society Teleforum on Chinese Cyber Hacking Tomorrow
For those of our readers who are members of the Federalist Society, its next “teleforum” conference call is tomorrow (Tuesday 3/12) at 2 p.m. (EST) on the subject of “Cybersecurity And the Chinese Hacker Problem.” The three panelists are Richard…

US v. Cotterman — Laptop Searches at the Border Require “Reasonable Suspicion”
Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland security/border issues. The Ninth Circuit sitting en banc has decided US v. Breaking news late on a Friday afternoon, addressing both cybersecurity and homeland…

House Committee Jurisdiction and CISPA
Last year, the House Intelligence Committee passed out a bill, the Cyber Intelligence Sharing and Protection Act (CISPA) that eventually was adopted with bipartisan support in the House of Representatives. The bill drew a veto threat from President…

Cybersecurity Readings: Crowdsourcing Cybersecurity
Gary Shiffman and Ravi Gupta have written an interesting new article: “Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons.” From the abstract:Individuals increasingly rely upon the internet for…
Cyber in the Heart of Darkness
One of the most notable challenges in dealing with cybersecurity is the difficulty of adequately conveying the scope and size of cyberspace. It’s easy to say that there are nearly 2.5 billion internet users in the world (35% of the world’s…

Obama’s Cybersecurity Executive Order Falls Short
In his State of the Union address, President Obama announced that he had signed an executive order (EO) on cybersecurity. The order uses a standard-setting approach to improve cybersecurity. However, such a model will only impose costs, encourage…