by Paul Rosenzweig | Sep 28, 2014 | Cybersecurity, National Security
Today’s New York Times opened with an above-the-fold story entitled “Spy Agencies Urge Caution on Phone Deal.” The Wall Street Journal had a similar report, about “Security Concerns Arise with Phone Database Contract.” The gravamen of both articles…
by Paul Rosenzweig | Sep 20, 2014 | Cybersecurity, Data Privacy
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…
by Paul Rosenzweig | Sep 16, 2014 | Cybersecurity
To “jump the shark” is a symbol for when a phenomenon (usually a TV show) reaches its apex and begin declining in quality. It’s named after a famous “Happy Days” episode where Fonzie gets on a water skis and actually jumps over a shark. Though…
by Paul Rosenzweig | Jul 21, 2014 | Cybersecurity
Sorry, I just couldn’t resist the title which does not reflect my true feelings about CISA, the Cybersecurity Information Sharing Act of 2014. Approved earlier this month by the Senate Intelligence Committee, this bill awaits Senate floor action. In…
by Paul Rosenzweig | Jun 17, 2014 | Cybersecurity
Last week, as I noted in Bits and Bytes, the Chairman of the FCC, Tom Wheeler, gave a speech at AEI in which he claimed a role for the FCC in advancing cybersecurity.Today, Rep. Mike Rogers threw a flag. In a letter to the FCC, he wrote that the…