The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…
Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…
The Cybersecurity Information Sharing Act of 2015 passed out of the Intelligence Committee by a 14-1 vote. With that passage, and the House adopton of two similar bills in April, some of us had begun to hope that the long-awaited passage of…
Reports that China (most likely) has breached Office of Personnel Management (OPM) systems and stolen personal information (PI) of over four million current and/or former federal employees raises all sorts of questions regarding the government’s…