Neustar? What’s a Neustar?
Today’s New York Times opened with an above-the-fold story entitled “Spy Agencies Urge Caution on Phone Deal.” The Wall Street Journal had a similar report, about “Security Concerns Arise with Phone Database Contract.” The gravamen of both articles…
The Encryption Wars Continue
As the recent indirect debate between FBI Director James Comey and co-blogger Susan Landau makes clear, the underlying premises of the encryption issue are highly contested. The Senate will continue the debate this week with a hearing before the…
Cyber Jumps The Shark
To “jump the shark” is a symbol for when a phenomenon (usually a TV show) reaches its apex and begin declining in quality. It’s named after a famous “Happy Days” episode where Fonzie gets on a water skis and actually jumps over a shark. Though…
CISA Boom Bah …
Sorry, I just couldn’t resist the title which does not reflect my true feelings about CISA, the Cybersecurity Information Sharing Act of 2014. Approved earlier this month by the Senate Intelligence Committee, this bill awaits Senate floor action. In…
The Strange Demise of TrueCrypt and What It Says About Cybersecurity
A small earthquake happened at the end of May – a well-regarded, widely known encryption program called TrueCrypt shut its doors. For those who care about surveillance, encryption, and open-source methodologies, the change was abrupt and disturbing.…