I talk about the photographs of Congresswoman Katie Hill and whether the rush to portray her as a victim of revenge porn raises questions about revenge porn laws themselves. Paul Rosenzweig, emboldened by twin tweets – from President Trump calling…
Announcing an annotated partial bibliography of publicly available cybersecurity measurement methodologies. For those who are following along in my ongoing quest to develop concrete cybersecurity metrics, I want to point you to a new, valuable…
Increasingly, we are incorporating into our daily lives devices and services that collect metadata: from our smartphones, to our web browsers, to an ever-expanding assortment of IoT-connected appliances, and even our cars. All of these generate…
From Center on National Security: VI: What is the larger definition of cyber threats that would prompt a need for cybersecurity in American society and the world’s liberal democracies? What threats are we actually facing? Paul Rosenzweig: I box cyber…
Unless a few key Republicans revolt against President Trump and bring the rest of the caucus with them, this situation won’t change. Thus the president has figured out that congressional enforcement mechanisms are mostly notional, says Paul…