A revised draft of the cybersecurity bill contains information sharing provisions that were heavily negotiated between the Obama administration and privacy groups. This effort at compromise has prompted the usual ambiguous praise from privacy groups. The Electronic Frontier Foundation, though “pleased” with the progress, complained that the measure still “contains broad language around the ability
July 2012
California Boosts Privacy Enforcement
California Attorney General Kamala Harris announced yesterday that she is creating a Privacy Enforcement and Protection Unit in her office. The PEPU, which will consist of six prosecutors, will be responsible for prosecuting companies that violate the state’s privacy laws.
California, of course, has been at the vanguard of privacy protection, enacting the nation’s first…
New ABA Book on National Security Law
The ABA’s Standing Committee on Law and National Security has just released a sequel to its first book on national security legal topics. The first book, Patriot Debates, focused heavily on the USA Patriot Act.
The second book, Patriots Debate, is a wider-ranging look at law and national security. Both volumes are distinguished by…
More Trouble for ZTE
ZTE, the huge Chinese telecom equipment manufacturer, has found themselves in a kind of perfect storm. A storm largely of their own making.
First, ZTE and its larger Chinese rival, Huawei, have been the subjects of great national security concern for years. As I discussed last month the US intelligence community is worried that, if…
The First Circuit and Cybersecurity
Can you hear the legal ground shifting under the feet of the banks?
Many small businesses are now infected by keylogging software. Hackers use it to steal banking credentials and make wire transfers. It is very difficult to keep the hackers out, at least for small businesses. The most promising way to defeat such fraud…
China-US “Proxy” Cyberwar Negotiations?
Over the past three years think tanks in China and in the US have been conducting what could be called “proxy” negotiations on cyberwar and cyberespionage. The China Institutes of Contemporary International Relations and the US Center for Strategic and International Studies are establishment institutions, with just enough independence from their governments to make the…
Careers in Computer Security
One of the things I like about computer security is how uncredentialed the whole field is. Very few senior computer security people started their careers in the field. One of the best I knew started her career as a nurse; others as cops; a few as lawyers. Some even started in computer science. But this…