by Paul Rosenzweig | Jun 22, 2012 | Cybersecurity, Homeland Security, National Security
One of the interesting aspects of blogging for Lawfare is that I get to try on a few new hats. For years, I have thought of myself as a lawyer and a policy analyst — hats I get to wear every day and the ones I wear most often even on Lawfare. Today,…
by Paul Rosenzweig | Jun 21, 2012 | Cybersecurity
As the prospects for real cybersecurity legislation seem to fade, this may be a product whose time has already come and gone. Nevertheless, for those who want a handy chart outlining (in far too brief a fashion) the major similarities and differences…
by Paul Rosenzweig | Jun 18, 2012 | Cybersecurity, Homeland Security
As Raffaela noted earlier today, there appears to be some momentum gaining for the proposed Whitehouse-Kyle compromise legislation on cybersecurity — at least if a letter from Senators Snowe and Warner constitutes momentum. To date, I do not believe…
by Paul Rosenzweig | Jun 1, 2012 | Cybersecurity
By now almost everyone has read David Sanger’s fascinating New York Times story relating the behind-the-scenes story of the development and deployment of the Stuxnet virus as part of a larger classified program known as “Olympic Game.” Others,…
by Paul Rosenzweig | May 23, 2012 | Cybersecurity
I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation. In the interest of furthering the debate, this article on How to Destroy…
by Paul Rosenzweig | May 23, 2012 | Cybersecurity, Homeland Security
Abstract: The number of cybersecurity attacks on, and breaches within, the United States government has been growing. The U.S. Senate is now gearing up to debate cybersecurity legislation—and will have to vote on whether the federal government should…