by Paul Rosenzweig | Jul 30, 2015 | Cybersecurity, Homeland Security, National Security
The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…
by Paul Rosenzweig | Jul 26, 2015 | Cybersecurity, National Security
Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…
by Paul Rosenzweig | Jul 5, 2015 | Cybersecurity
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…
by Paul Rosenzweig | Jun 10, 2015 | Cybersecurity
The Cybersecurity Information Sharing Act of 2015 passed out of the Intelligence Committee by a 14-1 vote. With that passage, and the House adopton of two similar bills in April, some of us had begun to hope that the long-awaited passage of…
by Paul Rosenzweig | Jun 6, 2015 | Cybersecurity, National Security
Reports that China (most likely) has breached Office of Personnel Management (OPM) systems and stolen personal information (PI) of over four million current and/or former federal employees raises all sorts of questions regarding the government’s…