There are lots of ways to cover tech platforms, but the past few decades have shown that the techniques most effective at moving law and policy forward take time and a scientific rigor.
Latest in Cybersecurity
I don’t disagree with much that Alexei Bulazel, Sophia d’Antoine, Perri Adams and Dave Aitel wrote on Huawei and risk mitigation, and endorse almost all of their argument.
Information attacks, whether they’re attempts to polarize political processes or to increase mistrust in social institutions, involve a series of steps. And enumerating those steps will clarify possibilities for defense.
The Mueller report contains some interesting tidbits 0n "going dark" and bitcoin.
Julian Assange’s story is also the story of how the utopian possibilities of the internet turned into something much bleaker and more frightening.
The post-Christchurch law creates new offenses and liability, including imprisonment and huge fines for failing to take down violent content. But it is riddled with ambiguities.
In 2015, a Brookings paper identified 78 perpetrators of sextortion. I found many more—both alleged perpetrators and victims’ accounts.
The United States cannot fall behind China in 5G implementation. But that implementation will bring with it substantial national security, cybersecurity and privacy risks.
A lawsuit in Illinois state court may help clarify how government attribution of cyberattacks affects private cyber insurance markets.
The Trump administration’s efforts to protect the security of fifth-generation, or 5G, wireless networks by limiting the deployment of Chinese technology both domestically and globally meld trade policy with cybersecurity policy. On both counts, it should not be considered sufficient.