We spend a lot of time on Lawfare describing the problems that result from data exfiltration, whether government policies should change as a result, etc. This post is a bit of a change; it's about technical ways to protect yourself–or more accurately, a link to such.
DayZero: Cybersecurity Law and Policy
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
In this episode, I interview Elsa Kania, author of a Center for a New American Security report on China’s plan for military uses of artificial intelligence—a plan that seems to have been accelerated by the asymmetric impact of AlphaGo on the other side of the Pac
While the Shadow Brokers and Vault 7 leaks left trails of evidence behind them, there have been no arrests in the last eight months.
Episode 195 features an interview with Susan Hennessey of Lawfare and Andrew McCarthy of the National Review. They walk us through the “unmasking” of U.S.
Documents concerning a former NSA Tailored Access Operations (TAO) developer, Nghia Hoang Pho, who pleaded guilty on Friday to willful retention of national defense information.
We need a national strategy for securing elections.
An unsealed indictment of three Chinese nationals charged with hacking the systems of U.S. companies for economic advantage calls into question the robustness of commercial espionage norms.
Subscribe to DayZero: Cybersecurity Law and Policy via RSS.