It doesn’t take much to imagine the consequences of a successful cyber attack. In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home. It doesn’t…
Late last night Senators Lieberman and Collins introduced revised cybersecurity legislation. A short summary of the revised Cybersecurity Act of 2012 suggests that the major changes are 1) elimination of a mandatory regulatory system in favor of a…
high-level threats—spawned by motivated, sophisticated, and well-resourced adversaries—could increase very quickly on a very short time-scale, potentially leading to what some dub a “digital Pearl Harbor” (that is, a catastrophic event whose…
Two think tanks — one from China and one (CSIS) from the US have been conducting a dialogue on cybersecurity over the past several years. This joint release (English at the bottom) summarizes some of their discussions. From the introduction:Since…
Jessica Herrera-Flanigan certainly seems to think so and, honestly, I can’t disagree with her. From the article:Even if cybersecurity legislation does get through the Senate, there is not a clear path forward for reconciling that bill (or bills) with…
One of the interesting aspects of blogging for Lawfare is that I get to try on a few new hats. For years, I have thought of myself as a lawyer and a policy analyst — hats I get to wear every day and the ones I wear most often even on Lawfare. Today,…