DOJ, AG Tout ‘Responsible Encryption’ to Bolster Prosecutions

In the past week, U.S. Deputy Attorney General Rod J. Rosenstein delivered two talks that implored the technology industry to embrace what he deems “responsible encryption.” When he spoke at the United States Naval Academy, he cloaked his commentary in hyperbole and innuendo, as if he was trying to draw battle lines between industry and..
Read more

The Russian Bull’s-Eye on NSA

Last week the Wall Street Journal broke a story about yet another, as yet unidentified, National Security Agency (NSA) contractor who has been taken into custody for improper handling of classified materials. This individual loaded ultra-sensitive NSA documents on to his devices, which apparently used Kaspersky security software. Allegedly, the software was used to siphon..
Read more

Dissecting China’s Global Bilateral Cybersecurity Strategy

Is China making nice in the cyberworld or is the company blowing smoke up our legs? Over the course of the past two years, we have seen China sign multiple bilateral cybersecurity agreements with countries that all could classify as potential adversaries and pursue high-level dialogue when agreements are a step too far. These countries..
Read more

Privacy and Surveillance Self-Defense

When reading the latest iteration of the Electronic Freedom Foundation’s “Surveillance Self-Defense” (SSD) guide on maintaining one’s privacy, one might write it off as another stellar entry for those who enjoy “buzzword bingo.” To do so would be a mistake; while the guide is chock-a-block full of buzzwords, it is also full of advice and..
Read more

Waymo, Uber Smokin’ Due Diligence Report is on Fire

The Waymo v. Uber court battle continues to captivate us, as the federal court made public the August 2016 due diligence report which Uber’s outside counsels had contracted Stroz Friedberg to conduct prior to the purchase of the self-driving startup Ottomotto. The 34-page document appears to pour gasoline on the smoldering question, Did Uber know..
Read more

Swedes Under Surveillance as New Data Retention Law Proposed

While the rest of the world has been embroiled in the cybersurveillance activities of the United States, China and Russia, Sweden may be about to adjust its data retention requirements of ISPs. A proposed law will require the ISPs in Sweden to increase their metadata retention period from six months to 10. Sweden introduced the..
Read more

EU: Let the (Cyberwar) Games Begin

“Let the games begin!” was heard at 2017 Council of the European Union meeting held in Tallinn, Estonia in early September. Various defense ministers and their national security teams participated in the 2017 CYBRID cyberwar exercise as part of the intergovernmental cooperation on cybersecurity. The scenario, according to Reuters, included a cyberattack on the EU’s..
Read more

Global Voting Susceptible to Shenanigans

You did your civic duty and voted. Voting is important. Election results are pouring in and you’re glued to the internet watching the tabulations. This exercise is occurring around the world with regular cadence. Sometimes with outcries of shenanigans. Now, depending upon where you might be sitting your vote may have been the old-fashioned paper..
Read more
Page 1 of 212