Skip to content

Posts by Paul Rosenzweig

Paul Rosenzweig is the founder of Red Branch Consulting PLLC, a homeland security consulting company and a Senior Advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the Department of Homeland Security. He is a Distinguished Visiting Fellow at the Homeland Security Studies and Analysis Institute. He also serves as a Professorial Lecturer in Law at George Washington University, a Senior Editor of the Journal of National Security Law & Policy, and as a Visiting Fellow at The Heritage Foundation.

The Law and Policy of Ebola Interdiction

By
Thursday, October 9, 2014 at 7:00 AM

A few days ago President Obama announced his intention to do greater screening of passengers arriving in the United States, as a way of interdicting the spread of the Ebola virus. According to the Washington Post, the new procedures will include “entry” screening – that is screening upon arrival in the United States – layered . . .
Read more »

China’s Cyber War on the Protesters

By
Monday, October 6, 2014 at 8:30 AM

As Benjamin Bissell noted a few days ago, Hong Kong protestors have developed some interesting ways of trying to avoid Chinese repression, including the use of an app, FireChat, that allows them to communicate without using the internet at all.  But, as you might expect, China was not likely to stand idly by.  Consider this . . .
Read more »

New Tech and National Security Law — 3D Printing Redux

By
Sunday, October 5, 2014 at 2:52 PM

Just as Ben seems taken with Drone technology, I’ve become a fan of 3D Printing (otherwise known as Additive Manufacturing) and its national security implications.    And it’s becoming a bit of a “thing” here in Washington DC as the 2nd Annual Additive Manufacturing for Government conference later this year will attest.  But the real attraction . . .
Read more »

Whistleblowers, Leaks and the Media: The First Amendment and National Security

By
Thursday, October 2, 2014 at 12:06 PM

Permit me a small amount of self-promotion, with apologies.  But ABA Publishing has, today, released a new book, Whistleblowers, Leaks and the Media: The First Amendment and National Security, of which I am a co-editor.  The book is a joint project of the American Bar Association Standing Committee on Law and National Security, and the . . .
Read more »

Neustar? What’s a Neustar?

By
Monday, September 29, 2014 at 4:16 PM

Today’s New York Times opened with an above-the-fold story entitled “Spy Agencies Urge Caution on Phone Deal.”  The Wall Street Journal had a similar report, about “Security Concerns Arise with Phone Database Contract.”  The gravamen of both articles was the potential national security implications of a relatively obscure decision to consider transferring a phone switching . . .
Read more »

The Encryption Wars Continue

By
Saturday, September 20, 2014 at 12:31 PM

For quite a while it has been the case that properly implemented encryption will defeat efforts to crack it (at least using current technology). Yet it has been the case for an equally long time that very few people actually use encryption to protect their vital secrets – not journalists, not criminals, and most assuredly . . .
Read more »

The FBI’s Facial Recognition Program

By
Thursday, September 18, 2014 at 8:30 AM

Earlier this week, the FBI announced the completion of its “next generation” facial recognition program.  The system, now “fully operational” will house more than 52 million faces, which (assuming no duplication) is roughly 1 in 6 Americans.  The system is said to be only moderately effective — it will typically return 50 possible matches for . . .
Read more »

Cyber Jumps The Shark

By
Wednesday, September 17, 2014 at 12:23 PM

To “jump the shark” is a symbol for when a phenomenon (usually a TV show) reaches its apex and begin declining in quality.  It’s named after a famous “Happy Days” episode where Fonzie gets on a water skis and actually jumps over a shark.  Though usually directed at artistic media, the phrase sometimes resonates with . . .
Read more »

Reorganizing Congress — A 9/11 Perspective

By
Thursday, September 11, 2014 at 1:26 PM

On this day of remembrance, the three prior Secretaries of the Department of Homeland Security have issued a joint letter calling on Congress to reorganize itself and streamline oversight of DHS.  I can think of no better way for Congress to honor those who have died than by taking steps to get its own house . . .
Read more »

Consequence, Weapons of Mass Destruction, and the Fourth Amendment’s ‘No-Win’ Scenario

By
Sunday, September 7, 2014 at 10:29 AM

And, since I’m catching up on my blogging this morning, let me also recommend this paper by Scott Glick from the National Security Division of DOJ.   Very much relevant to the ongoing meta-data debate and other post-9/11 domestic law enforcement issues.  You may not agree, but it is worth a read. Here’s the abstract: . . .
Read more »

Exploding Gas Tanks: Risk, Liability and Internet of Things

By
Sunday, September 7, 2014 at 10:24 AM

Well, summer is over now and it’s time to get back to the real world.  For starters, I had a chance to participate in a podcast for The Security Ledger on the topic of the vulnerability of the Internet of Things.  Here’s a summary and the full podcast is at the Security Ledger web page: . . .
Read more »

Reflections on DefCon and Black Hat

By
Tuesday, August 12, 2014 at 10:53 AM

I had the opportunity to go to Las Vegas last week to attend the annual events surrounding DefCon and Black Hat.  DefCon is a 22-year old convention of hackers (a/k/a security researchers) and Black Hat is its more “corporate” adjunct.  It tells you almost everything you need to know about the difference between them that . . .
Read more »

Everybody is Vulnerable

By
Wednesday, July 30, 2014 at 8:01 PM

Even the vaunted Israelis. “A Chinese hacking team previously accused of being behind raids against US defence contractors has been accused of a new data heist: plundering the tech behind Israel’s Iron Dome missile defence system.”  Apparently this was in 2011-12 so it isn’t connected to the current conflict — except, of course, that it . . .
Read more »

True Lawfare — The Fight to Seize Iran’s Domain Name Continues

By
Wednesday, July 30, 2014 at 5:24 PM

A month ago, we wrote about an effort by several plaintiff’s lawyers, representing terrorist victims, to seize the Iran domain name (.IR).  Turns out there was even more to it than we were aware of at the time, as the same group of lawyers have filed similar writs of attachment against Syria (.SY) and North . . .
Read more »

Bits and Bytes

By
Wednesday, July 23, 2014 at 3:25 PM

A distinctly conflict oriented flavor today: Inside Anonymous’ Cyber War Against the Israeli Government.  “The shadowy hacker collective known as Anonymous has announced it will launch a round of cyber-attacks this Friday against the Israeli government, in retaliation for Israel’s ongoing military intervention in Gaza. This onslaught would add to a wave of cyber assaults staged . . .
Read more »

CISA Boom Bah …

By
Tuesday, July 22, 2014 at 4:53 PM

Sorry, I just couldn’t resist the title which does not reflect my true feelings about CISA, the Cybersecurity Information Sharing Act of 2014.  Approved earlier this month by the Senate Intelligence Committee, this bill awaits Senate floor action.  In the current environment, I think its legislative prospects are modest (though perhaps we might see it . . .
Read more »

Progress on NSA Reform?

By
Tuesday, July 22, 2014 at 4:29 PM

So reports the LA Times.  Here’s a short summary: As part of the deal, the intelligence community agreed to a stricter definition of the search terms the NSA may use to seek data from telephone companies that might be useful in connecting the dots between known terrorists, said the official who would not be identified . . .
Read more »

The Loss of MH17 Over Ukraine

By
Thursday, July 17, 2014 at 4:04 PM

Much will, no doubt, be written about the destruction of Malaysian Flight 17 today over Ukraine.  Early speculation is that the plane may have been destroyed by Ukrainian separatists, who deny the charge.  War on the Rocks (a generally useful military blog) has collected many of the most relevant bits of data that form the . . .
Read more »

Bits and Bytes

By
Tuesday, July 8, 2014 at 9:15 AM

China hacks DC Think Tanks. “Middle East experts at major U.S. think tanks were hacked by Chinese cyberspies in recent weeks as events in Iraq began to escalate, according to a cybersecurity firm that works with the institutions.”  [Heads-up Brookings, AEI, Hoover, Lawfare, Heritage, CSIS, CAP, etc.] Russian arrested in Guam on hacking charges.  “A Russian man accused . . .
Read more »

Happy Fourth of July

By
Friday, July 4, 2014 at 12:04 PM

A great version from the Gaither Vocal Band: