Latest in Bits and Bytes

Bits and Bytes

Bits and Bytes

FTC v. Wyndham.  The Third Circuit heard oral argument the other day in this long-running case that will test whether or not the FTC can use its "unfair" business practices authority to sanction companies that allegedly take inadequate cybersecurity measures.  If the FTC loses, I predict the FCC will fill the void ....

Bits and Bytes

Bits and Bytes

If you weaken crypto ... you weaken crypto.  "Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov."  The vulnerability (deliberate use of 512-bit encyrption) is the result of our Crytpo Wars back in the 1990s.

Bits and Bytes

Bits and Bytes

Are Submarines Becoming Obsolete?  Perhaps, in light of enhanced data processing capabilities.  "[T]he ability of submarines to hide through quieting alone will decrease as each successive decibel of noise reduction becomes more expensive and as new detection methods mature that rely on phenomena other than sounds emanating from a submarine.

Bits and Bytes

Bits and Bytes

What War in the Cyber Age Looks Like.  "To the young Syrian rebel fighter, the Skype message in early December 2013 appeared to come from a woman in Lebanon, named Iman Almasri, interested in his cause. Her picture, in a small icon alongside her name, showed a fair-skinned 20-something in a black head covering, wearing sunglasses. . . .

Bits and Bytes

Bits and Bytes

You go off line for 3 days and so much worth noting happens!  Here are some recent developments:

DHS Ooops.  Responding to a FOIA request regarding Operation Aurora (a Chinese attack on Google) DHS accidentally also releases classified data on Project Aurora (the first demonstration of SCADA vulnerabilities in the electric grid).  Our bad!

http://www.washingtonpost.com/blogs/the-switch/wp/2015/01/28/a-simple-so...

Bits and Bytes

Bits and Bytes

The Russians are Coming.  A trojan horse malware program has deeply penetrated US critical infrastructure and the Russians are probably behind it.

The Crypto-Libertarians are Not Coming.  More than 400 Dark Web sites, including the infamous Silk Road 2.0 have been taken down in a joint US-EU law enforcement operation.  Some of the sites operated through the TOR network.

Subscribe to Lawfare

EmailRSSKindle