experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Comparing the Various Cybersecurity Legislative Proposals
As the prospects for real cybersecurity legislation seem to fade, this may be a product whose time has already come and gone. Nevertheless, for those who want a handy chart outlining (in far too brief a fashion) the major similarities and differences…

The Whitehouse-Kyl Compromise Cyber Legislation
As Raffaela noted earlier today, there appears to be some momentum gaining for the proposed Whitehouse-Kyle compromise legislation on cybersecurity — at least if a letter from Senators Snowe and Warner constitutes momentum. To date, I do not believe…

The Stuxnet Story and Some Interesting Questions
By now almost everyone has read David Sanger’s fascinating New York Times story relating the behind-the-scenes story of the development and deployment of the Stuxnet virus as part of a larger classified program known as “Olympic Game.” Others,…
The Alarming Trend of Cybersecurity Breaches and Failures in the U.S. Government
Abstract: The number of cybersecurity attacks on, and breaches within, the United States government has been growing. The U.S. Senate is now gearing up to debate cybersecurity legislation—and will have to vote on whether the federal government should…

How to Destroy the Internet
I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation. In the interest of furthering the debate, this article on How to Destroy…

The Unpersuasiveness of the Case for Cybersecurity Regulation – An Introduction
My friend, Jack Goldsmith, wonders whether my earlier post about the pending Congressional proposal to regulate cybersecurity was a reference to General Alexander’s failure to persuade Senator McCain of the merits of a regulatory program, or an…
CISPA Disappoints in the End
As the House began its consideration of cybersecurity legislation last month, there was reason to be optimistic about the course that the House Leadership and the House Intelligence Committee had set. The Cyber Intelligence Sharing and Protection Act…

Significant Cyber Attacks on Federal Systems — 2004-present
U.S. Senate – June 2011 – The Sergeant at Arms confirmed that the U.S. Senate’s website had been hacked after files from the website were posted online, indicating that Lulz Security had broken into the Senate’s computer network.…

Looking at CISPA
Well, the Cyber Intelligence Sharing and Protection Act passed the House last week. Now that the dust has cleared (and before we move on to the coming Senate battles) it’s probably worthwhile looking at the changes that were made to CISPA in the…

Obama Administration SAP On Rogers-Ruppersberger
In an earlier post I commented on the politics of the cybersecurity debate. I wrote: “One final piece of the political calculus is what the Administration wants. Right now all public signs are that they want BOTH information sharing AND the…