by Paul Rosenzweig | Sep 3, 2015 | Cybersecurity, Homeland Security, National Security
A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…
by Paul Rosenzweig | Aug 25, 2015 | Cybersecurity
As Wells reported Monday, the Third Circuit has issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp. Readers may recall the background of the case. Wyndham was hacked by a Russian criminal gang who stole a host of personally…
by Paul Rosenzweig | Jul 30, 2015 | Cybersecurity, Homeland Security, National Security
The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…
by Paul Rosenzweig | Jul 26, 2015 | Cybersecurity, National Security
Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…
by Paul Rosenzweig | Jul 5, 2015 | Cybersecurity
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…