Category Archives: Cybersecurity
Lawfare readers will recall that I earlier blogged about the Federal Trade Commission’s case against Wyndham Hotels. Under the mantle of its consumer protection mandate, the FTC has sought to impose civil penalties against those companies who do not … Read more »
Congress is in recess now (that’s why it’s so quiet here in Washington) and when they return the first order of business for the Senate is to take up the 2014 NDAA. The bill, authorizing activities of the Department of … Read more »
From last week’s Federalist Society’s convention in Washington, here’s a discussion between former Attorney General Michael Mukasey and international law scholar Jeremy Rabkin on NSA data collection. It was moderated by former Deputy Attorney General George Terwilliger.
And here’s video … Read more »
Jeremy Hammond was sentenced to 10 years in prison yesterday. That’s the maximum sentence he could have gotten for his plea of guilty to a single instance of hacking a computer.
Readers of this blog will be forgiven if … Read more »
Over the past month, Jane Chong has written a series of posts published over at Security States that go under the title “Bad Code.” Her thesis (amply documented) is that those who write software code generally take inadequate precautions to … Read more »
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem … Read more »
Does holding software providers accountable for the insecurity of their code amount to going nuclear on the industry—the equivalent of pushing the big red button? I argue that this is the way critics see it, in the fifth and final … Read more »
If you believe software providers should be held more accountable for insecure code or coding practices, you might be tempted to point an accusing finger at the contract law framework that courts use to parse software license agreements. The problem … Read more »
What do software users have in common with Mary Mallon, better known today as Typhoid Mary? A lot—and that’s why we shouldn’t be leaving the quality of code in the hands of the market. Confused? Connect the rest of the … Read more »
Over at Security States, I have a post entitled “When Companies Are Hacked, Customers Bear the Brunt. But Not for Long” that details two recent Federal cases in which service providers were found potentially liable for tort injuries … Read more »
One of the most significant questions in cyberspace is the long term governance of the domain. For years the United States has had an influential role in that governance (mostly, in my view, to the benefit of the domain). Inevitably, … Read more »