The Kinetics of Cyberwar

The Wall Street Journal reports that the Department of Defense has formalized its doctrine for responding to cyber-attacks. (Hat tip: Thinh Nguyen.) Unsurprisingly, the Pentagon has adopted a pragmatic posture of equivalence: cyber-attacks of sufficient impact could meet with a kinetic response. In other words, logic bombs might prompt America to employ real ones. The [...]

Hacking the Grid

Normally, bloviating about security follows a simple rule: disagreeing with Bruce Schneier = wrong. But I do disagree with Bruce about the recent decision by security researcher Dillon Beresford to withhold details about a vulnerability he discovered in Siemens’ SCADA (Supervisory Control And Data Acquisition Systems) controllers. These are the same type of systems that [...]

Cybersecurity in Santa Clara

I’m here at Eric Goldman and Dan Hunter‘s great Works-in-Progress in Internet Law conference at Santa Clara Law. My talk is about my cybersecurity paper, Conundrum, which I’ll be posting to SSRN after incorporating feedback from the confab. I’m looking forward to David Opderbeck‘s piece as well, and just learned a lot about data anonymization [...]

WikiWhat?

I’m speaking on a panel discussing WikiLeaks this Thursday. It’s free, and will be good fun. Please come! What: WikiLeaks? WikiWhat? WikiWho? WikiWhy? When: Thursday, 17 February 2011, 7:00 – 8:30PM Where: N.Y. County Lawyers’ Association, 14 Vesey Street, New York, NY Sponsors: Network of Bar Leaders, N.Y. County Lawyers’ Association, and Voterbook RSVP: Jeff [...]

WikiLeaks and the Pentagon Papers

Note: I forgot to mention that the piece is coming out this spring in the Wake Forest Journal of Law & Policy. Thanks to Jim Bauer and his team for their hard work on it! (Updated 15 Feb. 2011.) Hat tip: to Larry Solum and Josie Brown for linking to the piece on their blogs. [...]

Rafal Rohozinski on Internet Surveillance and Monitoring

My former ONI colleague Rafal Rohozinski, now of Information Warfare Monitor, has a great interview where he discusses methodology and findings for both projects. Well worth a read!

AT&T: Safe, But Mocked

Works in more places… I suppose the fake place name would be NSFrancisPying. (Hat tip to an anonymous friend!) The Supreme Court declined to hear an appeal of the Sixth Circuit’s ruling that the plaintiffs in the NSA suit here in Michigan lacked standing. The hard part, of course, is it’s extremely difficult to prove [...]

U.S. Intelligence Eyes Second Life

Robert O’Harrow, a Washington Post reporter who is very insightful and current in his coverage of data privacy (and author of a good book on it too), today chronicles the inevitable first stirrings of government fear about virtual worlds such as Second Life: Intelligence officials who have examined these systems say they’re convinced that the [...]

“John Doe” Speaks Out Against NSL Gag Orders

The Washington Post has published a powerful op-ed piece by the anonymous recipient of one of the FBI’s national security letters, who is prohibited by law from disclosing even the fact that he received one. National security letters (or “NSLs”) are the demands for information, issued without any requirement of judicial approval, that were the [...]

Corporate Responsibility and Info/Law

Activists and policy wonks who work with environmental issues take it for granted that private corporate activities and markets lie at the center of both the problems and the potential solutions (like this and this) to issues such as water pollution, global warming, and habitat destruction. Organizations like Ceres work with businesses to help them [...]