Header graphic for print
Steptoe Cyberblog

Tag Archives: FBI

The Cyberlaw Podcast – Interview with United States Senator Sheldon Whitehouse

Posted in Cybersecurity and Cyberwar, Security Programs & Policies

Episode 190: Interview with United States Senator Sheldon Whitehouse In our 190th episode Stewart Baker has a chance to interview United States Senator Sheldon Whitehouse (D-RI) has a long history of engagement with technology and security issues.  In this episode, we spend a remarkably detailed half-hour with him, covering the cybersecurity waterfront, from the FBI’s… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Patrick Henry, Dan Kaminsky, Kiran Raj, and Dr. Zulfikar Ramzan

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

No holds are barred as a freewheeling panel of cryptographers and security pros duke it out with me and the Justice Department over going dark, exceptional access, and the Apple-FBI conflict.  Among the combatants:  Patrick Henry, a notable cryptographer with experience at GCHQ, NSA, and the private sector; Dan Kaminsky, the Chief Scientist at White Ops;… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Glenn Gerstell

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

What is the most surprising discovery a law firm partner makes when he jumps to the National Security Agency?  I direct that and other questions at Glenn Gerstell, who has just finished six months in the job as General Counsel at the National Security Agency. In the news roundup, we begin, of course, with the… Continue Reading

Encryption: If This is the Best His Opponents Can Do, Maybe Jim Comey Has a Point

Posted in Security Programs & Policies

When industry opposes a new regulation, it can offer many arguments for its position. Here are three. Which one is real? “We share EPA’s commitment to ending pollution,” said a group of utility executives. “But before the government makes us stop burning coal, it needs to put forward detailed plans for a power plant that… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Juan Zarate

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest commentator for episode 49 of the Steptoe Cyberlaw podcast is Juan Zarate, a senior adviser at the Center for Strategic and International Studies (CSIS), the senior national security analyst for CBS News, a visiting lecturer at the Harvard Law School, and chairman and co-founder of the Financial Integrity Network.  Before joining CSIS, Juan… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Richard Danzig

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Wow, that was quick. I haven’t even turned on the air conditioning at home yet, and already we’ve done the last podcast of the summer.  The Steptoe Cyberlaw Podcast will go on hiatus for August and return after Labor Day! This week in NSA: The Senate Judiciary Committee, the most anti-NSA of the Senate committees… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Orin Kerr

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is noted computer law guru Orin Kerr, and the podcast is a deep dive into technology and law. This Week in NSA:  Snowden claims without substantiation that NSA employees are passing naked pix around.  And Greenwald’s venture reports that GCHQ has developed the ability to send spam and to rig web… Continue Reading

Corporate Network Defense: When Seconds Count, the FBI is Years Behind

Posted in Cybersecurity and Cyberwar, Data Breach, Security Programs & Policies

The Washington Post’s Ellen Nakashima wrote another cutting-edge article on innovative approaches to network defense.  I’ve blogged before about honeytokens, deceptive files that leave hackers with false data while flagging the intrusion to defenders.  The article suggests that their use is growing, as other defensive techniques prove ineffective: Brown Printing Co…began planting fake data in… Continue Reading