by Paul Rosenzweig | May 23, 2012 | Cybersecurity
I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation. In the interest of furthering the debate, this article on How to Destroy…
by Paul Rosenzweig | May 16, 2012 | Cybersecurity
My friend, Jack Goldsmith, wonders whether my earlier post about the pending Congressional proposal to regulate cybersecurity was a reference to General Alexander’s failure to persuade Senator McCain of the merits of a regulatory program, or an…
by Paul Rosenzweig | May 7, 2012 | Cybersecurity, National Security
As the House began its consideration of cybersecurity legislation last month, there was reason to be optimistic about the course that the House Leadership and the House Intelligence Committee had set. The Cyber Intelligence Sharing and Protection Act…
by Paul Rosenzweig | May 6, 2012 | Cybersecurity, Homeland Security
U.S. Senate – June 2011 – The Sergeant at Arms confirmed that the U.S. Senate’s website had been hacked after files from the website were posted online, indicating that Lulz Security had broken into the Senate’s computer network.…
by Paul Rosenzweig | May 3, 2012 | Cybersecurity, National Security
Well, the Cyber Intelligence Sharing and Protection Act passed the House last week. Now that the dust has cleared (and before we move on to the coming Senate battles) it’s probably worthwhile looking at the changes that were made to CISPA in the…