Barr’s speech on encryption mostly recycles old arguments but does say something new and important that changes the policy debate on exceptional access.
Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.
Subscribe to this Lawfare contributor via RSS.
The New York Times’s report that the U.S. has deployed code inside Russia’s grid casts doubt on the premise that a demonstration of an offensive cyber capability will destroy its future value as an operational asset.
Companies holding sensitive personal information on individuals have little incentive to improve their cybersecurity postures. Congress needs to act.
I don’t disagree with much that Alexei Bulazel, Sophia d’Antoine, Perri Adams and Dave Aitel wrote on Huawei and risk mitigation, and endorse almost all of their argument.
IT vendors are increasingly defining principles to guide the development of artificial intelligence. It’s worth taking a look at what those principles actually say.
It’s worth inserting some technical realities into the debate over whether the United States and its allies should or shouldn’t allow acquisition of Huawei 5G technology for use in communications infrastructure.
Even smart criminals make foolish statements on devices they think may be monitored by law enforcement.