experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

US-China Cyber Dialogue
Two think tanks — one from China and one (CSIS) from the US have been conducting a dialogue on cybersecurity over the past several years. This joint release (English at the bottom) summarizes some of their discussions. From the introduction:Since…

Is Cybersecurity Legislation Dead for 2012?
Jessica Herrera-Flanigan certainly seems to think so and, honestly, I can’t disagree with her. From the article:Even if cybersecurity legislation does get through the Senate, there is not a clear path forward for reconciling that bill (or bills) with…

Giving Ft. Meade a Third Hat
One of the interesting aspects of blogging for Lawfare is that I get to try on a few new hats. For years, I have thought of myself as a lawyer and a policy analyst — hats I get to wear every day and the ones I wear most often even on Lawfare. Today,…

Comparing the Various Cybersecurity Legislative Proposals
As the prospects for real cybersecurity legislation seem to fade, this may be a product whose time has already come and gone. Nevertheless, for those who want a handy chart outlining (in far too brief a fashion) the major similarities and differences…

The Whitehouse-Kyl Compromise Cyber Legislation
As Raffaela noted earlier today, there appears to be some momentum gaining for the proposed Whitehouse-Kyle compromise legislation on cybersecurity — at least if a letter from Senators Snowe and Warner constitutes momentum. To date, I do not believe…

The Stuxnet Story and Some Interesting Questions
By now almost everyone has read David Sanger’s fascinating New York Times story relating the behind-the-scenes story of the development and deployment of the Stuxnet virus as part of a larger classified program known as “Olympic Game.” Others,…

The Alarming Trend of Cybersecurity Breaches and Failures in the U.S. Government
Abstract: The number of cybersecurity attacks on, and breaches within, the United States government has been growing. The U.S. Senate is now gearing up to debate cybersecurity legislation—and will have to vote on whether the federal government should…

How to Destroy the Internet
I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation. In the interest of furthering the debate, this article on How to Destroy…

The Unpersuasiveness of the Case for Cybersecurity Regulation – An Introduction
My friend, Jack Goldsmith, wonders whether my earlier post about the pending Congressional proposal to regulate cybersecurity was a reference to General Alexander’s failure to persuade Senator McCain of the merits of a regulatory program, or an…

CISPA Disappoints in the End
As the House began its consideration of cybersecurity legislation last month, there was reason to be optimistic about the course that the House Leadership and the House Intelligence Committee had set. The Cyber Intelligence Sharing and Protection Act…