“Greetings from the Chinese Embassy.” That’s how the email opened. It was an invitation to lunch (or tea) with a counselor in the embassy to discuss cybersecurity. How could I say “no?” So I went to lunch the other day. It was, on the whole,…
Former Visiting Fellow, The Heritage Foundation (2009-2017) Former Visiting Fellow at The Heritage Foundation (2009-2017) The Justice Department announced Monday that it had indicted five members of the Chinese People’s Liberation Army on charges of…
The Internet is a powerful engine for growth and freedom, of which the United States has taken and continues to take full advantage. As everything from military systems to smartphones has become linked to the Internet, however, the number of bad…
Just before Thanksgiving, the President’s Council of Advisors on Science and Technology (which has among its membership luminaries such as Eric Schmidt of Google and Shirley Ann Jackson, the President of Renssalaer Polytechnic Institute) issued a…
The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at George Washington University Law School in April 2012, is to provide scholarly and other resources pr The purpose of this bibliography, originally…
[L]aw firms, government law departments, and other similarly situated organizations have become prime targets. Lawyers have limited resources to dedicate to computer security, may not have a sophisticated appreciation of the associated technology…