July 2012

A revised draft of the cybersecurity bill contains information sharing provisions that were heavily negotiated between the Obama administration and privacy groups. This effort at compromise has prompted the usual ambiguous praise from privacy groups. The Electronic Frontier Foundation, though “pleased” with the progress, complained that the measure still “contains broad language around the ability

California Attorney General Kamala Harris announced yesterday that she is creating a Privacy Enforcement and Protection Unit in her office. The PEPU, which will consist of six prosecutors, will be responsible for prosecuting companies that violate the state’s privacy laws.

California, of course, has been at the vanguard of privacy protection, enacting the nation’s first

This is the claim of former Pentagon analyst F. Michael Maloof that stories and podcasts are repeating but provide much new supporting evidence. Maloof’s own report is interesting and extensive, and it does indeed make the claim I’ve headlined:

The Chinese government has “pervasive access” to some 80 percent of the world’s communications, giving it

ZTE, the huge Chinese telecom equipment manufacturer, has found themselves in a kind of perfect storm. A storm largely of their own making.

First, ZTE and its larger Chinese rival, Huawei, have been the subjects of great national security concern for years.  As I discussed last month the US intelligence community is worried that, if

Over the past three years think tanks in China and in the US have been conducting what could be called “proxy” negotiations on cyberwar and cyberespionage. The China Institutes of Contemporary International Relations and the US Center for Strategic and International Studies are establishment institutions, with just enough independence from their governments to make the

One of the things I like about computer security is how uncredentialed the whole field is. Very few senior computer security people started their careers in the field. One of the best I knew started her career as a nurse; others as cops; a few as lawyers. Some even started in computer science. But this