high-level threats—spawned by motivated, sophisticated, and well-resourced adversaries—could increase very quickly on a very short time-scale, potentially leading to what some dub a “digital Pearl Harbor” (that is, a catastrophic event whose…
One of the interesting aspects of blogging for Lawfare is that I get to try on a few new hats. For years, I have thought of myself as a lawyer and a policy analyst — hats I get to wear every day and the ones I wear most often even on Lawfare. Today,…
As the House began its consideration of cybersecurity legislation last month, there was reason to be optimistic about the course that the House Leadership and the House Intelligence Committee had set. The Cyber Intelligence Sharing and Protection Act…
Well, the Cyber Intelligence Sharing and Protection Act passed the House last week. Now that the dust has cleared (and before we move on to the coming Senate battles) it’s probably worthwhile looking at the changes that were made to CISPA in the…
Minimization, Retention, and Notification Amendment: An amendment will be filed today that would:Provid Provide clear authority to the Federal Government to undertake reasonable efforts to limit the impact on privacy and civil liberties of the…
In an earlier post I commented on the politics of the cybersecurity debate. I wrote: “One final piece of the political calculus is what the Administration wants. Right now all public signs are that they want BOTH information sharing AND the…