Editor's Note: This post is adapted from remarks delivered to the Standing Committee on Law and National Security of the American Bar Association on January 15, 2020.
DayZero: Cybersecurity Law and Policy
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
Once again, the FBI is seeking Apple’s help in unlocking phones in a counterterrorism case. But this time, Apple is technically incapable of providing assistance.
Tor hidden services are intended to help dissidents and whistleblowers. Instead, they have provided a false sense of security to users and created a platform for child sexual exploitation.
There’s a fine line between legislation addressing deepfakes and legislation that is itself a deep fake. Nate Jones reports on the only federal legislation addressing the problem so far. I claim that it is well short of a serious regulatory effort—and pretty close to a fake law.
When U.S. Cyber Command gets involved with psychological operations, what is the role of military psy-ops troops?
The good news is that Facebook is finally taking action against deepfakes. The bad news is that the platform’s new policy does not go far enough.
The spending bill authorizes the Pentagon to create procurement pathways in which software can be purchased in less than a year. If effectively implemented, the change would be dramatic.
Subscribe to DayZero: Cybersecurity Law and Policy via RSS.