By now, most readers of this blog are well aware that, for a brief period of time yesterday, ISIS cyber warriors (going under the hashtag #CyberCaliphate) took control of the CENTCOM Twitter and You-Tube accounts. Twitter and You-Tube are, of course,…
There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of software liability, which would, drive safer code. There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of…
The House of Representatives has passed the Cybersecurity Intelligence Sharing and Protection Act, by a vote of 288-127. This happened after several amendments were adopted (most notably one offered by Rep. The House of Representatives has passed the…
Recent high-profile private-sector hacks have once again put a spotlight on the issue of cybersecurity.[1] This is a serious problem that requires legislation to improve the United States’ cybersecurity posture, but the U.S. should not reflexively…
A comprehensive examination of national security laws and the tensions between the public’s right to know, and the government’s right to protect its interests. A compilation of thoughtful essays that look at the constitutional foundations and limitations...