Allowing Senate staff to use Signal is an important move toward better information security.
Latest in Cyber & Technology
Matthew Waxman testifies before the Senate Armed Services Committee on the international law dimensions of U.S. cyber strategy and policy.
Red herrings aside, the Tallinn Manual 2.0 is a huge accomplishment.
FBI-style NITs to deanonymize Tor hidden service criminals may be on their way out. But going forward, law enforcement may be able to directly monitor the Tor network to perform targeted deanonymization.
In the world of kinetic military operations, collateral damage is typically straightforward to assess because of well-established definitions, well-understood weapon characteristics, and reasonably well-defined legal and policy frameworks. Sasha Romanosky and Zachary Goldman discuss the challenges of extending this framework to cyberattacks with non-physical consequences.
A new cyber policy book, Cyber Insecurity: Navigating the Perils of the Next Information Age, is out this month.
The U.S. Army's chief roboticist, Bob Sadowski, talks with BreakingDefense.com at the AUSA 2016 meeting about the U.S. military's path to self-driving vehicles in combat. Weapons are far from being the only military system gradually evolving toward automation and autonomy. Whether for civilian or military technologies, reliability testing protocols for complex software-driven robotic systems are at the center of safety and accountability regulation. DoD does this through legal weapons review. Are there things DoD and the civilian tech industry could learn from each other?
From a recent story on fedscoop:
Amid an onslaught of privacy and cybersecurity threats, it can be difficult to predict which potential concerns will capture the public imagination. A particularly unlikely candidate for public debate over privacy and cybersecurity is Pokémon Go.
The Second Circuit Court of Appeals ruled today that the Stored Communications Act "does not authorize courts to issue and enforce against U.S.-based service providers warrants for the seizure of customer e-mail content that is stored exclusively on foreign servers."