-
Today’s New York Times reports that Apple is pushing back on British demands for back doors to encrypted information in part by arguing that “Law enforcement today has access to more data — data which th...
-
The on-going debate on encryption and exceptional access for law enforcement agencies to encrypted communication—which recent attacks in Paris and California have only intensified—is also being closely s...
-
We have white smoke. Finally, after 8 years of discussion Congress has passed a cybersecurity information sharing bill. The Cybersecurity Act of 2015 is Division N of the omnibus spending bill that wil...
-
Yesterday, former Secretary of State Hillary Clinton outlined her national security plan against the Islamic State, speaking at the University of Minnesota in Minneapolis.
-
This week, the UN General Assembly considered a resolution mandating the creation of a Group of Governmental Experts (GGE) for 2016-2017. The GGE will study existing and potential threats in the sphere o...
-
Technologists don't oppose cryptographic backdoors based on some vague allegiance to civil liberties. We oppose them because we've been burned before. Backdoors fail, often quite badly. And the community...
-
This is the second post in a series analyzing the Daskal-Woods reform proposal for law enforcement demands for communications content across national borders. In the first post, I examined how the propo...
-
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has soug...
-
The President addressed the nation tonight in an effort to explain our strategy against ISIL, to specify some steps he would like Congress to take, and to underscore some things he thinks we should not d...
-
When the U.S. and China reached an agreement in late September not to engage in commercially motivated cyber espionage it was viewed as a significant step forward in cybersecurity relations between the t...
-
The contours of the present encryption debate are well known. Especially in the wake of the Paris shootings, law enforcement and national security (LE/NS) officials are worried that terrorist use of enc...
-
Buried in this morning's article covering the ongoing U.S.-China cybersecurity talks, Chinese state-owned media outlet Xinhua News said that an investigation had determined that the hack of the Office of...