Header graphic for print
Steptoe Cyberblog

Tag Archives: FISA

The Cyberlaw Podcast – Interview with United States Senator Sheldon Whitehouse

Posted in Cybersecurity and Cyberwar, Security Programs & Policies

Episode 190: Interview with United States Senator Sheldon Whitehouse In our 190th episode Stewart Baker has a chance to interview United States Senator Sheldon Whitehouse (D-RI) has a long history of engagement with technology and security issues.  In this episode, we spend a remarkably detailed half-hour with him, covering the cybersecurity waterfront, from the FBI’s… Continue Reading

The Cyberlaw Podcast – Interview with Chris Painter

Posted in European Union, Privacy Regulation

Episode 188: Putting the “F” in FISA: Bipartisan Extremism and the Road to 1997 In this episode, Brian Egan and I deconstruct the endlessly proliferating “FISA 702 Reform” bills, from the irresponsible House Judiciary bill to the “I’ll see your irresponsible and raise you crazy” bipartisan extremist bill beloved of Sens. Wyden and Paul (and talk… Continue Reading

Interview with Rebecca Richards and Elizabeth Goitein

Posted in Data Breach, International, Privacy Regulation

Episode 178: The Evil Dolphin Episode The Cyberlaw Podcast kicks off a series exploring section 702 – the half-US/half-foreign collection program that has proven effective against terrorists while also proving controversial with civil liberties groups.  With the program due to expire on December 31, we’ll examine the surveillance controversies spawned by the program. Today, we… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Tim Maurer

Posted in Data Breach, International, Security Programs & Policies

Episode 164: Stewart on the Road to Tarsus Episode 164 features Stewart Baker’s startling change of heart on the question of cyberspace norms. Credit goes to our interview guest, Tim Maurer, Fellow and co-director of the Cyber Policy Initiative at the Carnegie Endowment for International Peace. And perhaps as well to Brian Egan, former Legal… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Orin Kerr

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Does the FISA court perform a recognizably judicial function when it reviews 702 minimization procedures for compliance with the fourth amendment?  Our guest for episode 115 is Orin Kerr, GWU professor and all-round computer crime guru, and Orin and I spend a good part of the interview puzzling over Congress’s mandate that the FISA court… Continue Reading

Steptoe Cyberlaw Podcast – Interview with General Hayden

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies, Virtual Currency

Our guest for episode 114 is General Michael Hayden, former director of the NSA and CIA; he also confirms that he personally wrote every word of his fine book, Playing to the Edge: American Intelligence in the Age of Terror.   In a sweeping interview, we cover everything from Jim Comey’s performance at the AG’s hospital… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Patrick Henry, Dan Kaminsky, Kiran Raj, and Dr. Zulfikar Ramzan

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

No holds are barred as a freewheeling panel of cryptographers and security pros duke it out with me and the Justice Department over going dark, exceptional access, and the Apple-FBI conflict.  Among the combatants:  Patrick Henry, a notable cryptographer with experience at GCHQ, NSA, and the private sector; Dan Kaminsky, the Chief Scientist at White Ops;… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Joanne McNabb

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is Joanne McNabb, Director of Privacy Education and Policy for the California Attorney General’s Office.  Joanne discusses the findings and recommendations in the recently released 2014 California Data Breach Report.  She also offers insight into some of the key factors the Attorney General’s Office considers in deciding whether or not to… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Robert Litt

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is Robert (Bob) Litt, the General Counsel of the Office of the Director of National Intelligence.  Bob has had a distinguished career in government, from his clerkship with Justice Stewart, his time as a prosecutor in the Southern District of New York and at Main Justice, and more than five years… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Shaun Waterman

Posted in Cybersecurity and Cyberwar, Data Breach, Privacy Regulation, Security Programs & Policies

Our guest for the podcast is Shaun Waterman, editor of POLITICO Pro Cybersecurity.  Shaun is an award-winning journalist who has worked for the BBC and United Press International; and an expert on counterterrorism and cybersecurity. We begin as usual with the week’s NSA news.  NSA has released its second privacy transparency report.  We’ve invited Becky… Continue Reading

Steptoe Cyberlaw Podcast – Debate with Harley Geiger

Posted in Cybersecurity and Cyberwar, Security Programs & Policies

The Steptoe Cyberlaw Podcast is on hiatus in August, but we’ve brought it back for a special appearance – a debate over Senator Leahy’s version of the USA Freedom Act sponsored by the Federalist Society.  Moderated by Christian Corrigan, the debate pitted me against Harley Geiger, Senior Counsel and Deputy Director for the Freedom, Security… Continue Reading

Is Snowden a Spy?

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

That’s the possibility raised by Edward Jay Epstein in a (paywalled) Wall Street Journal op-ed.  Epstein offers some new evidence for his theory.  In particular he says that NSA investigators now know that Snowden’s tactics included breaking into two dozen compartments using forged or stolen passwords.  Once there, Snowden loosed an automated “spider” with instructions… Continue Reading