-
-
The New York Post recently reported on a hacker who claimed to have gained access to CIA Director John Brennan’s personal email account. The hacker then bragged to Wired magazine about how he did it.
-
In an earlier post, I advanced the idea that the drone registration process could be used to make actual drone operation safer.
In principle, there are two approaches to make drone operation safer. Ap...
-
On October 8, Governor Jerry Brown of California approved Senate Bill (S.B.) 178, or the California Electronic Communications Privacy Act, designed to designed to strengthen electronic privacy against la...
-
Assistant Attorneys General John Carlin (National Security Division) and Leslie Caldwell (Criminal Division) spoke last week at Roger Williams’ Cybersecurity conference, outlining an innovative approach ...
-
Just a few weeks ago, at a summit between Presidents Obama and Xi, the Chinese leader famously promised to end China's cyber economic espionage. Some, like me, saw this as an empty promise. Others, lik...
-
According to NBC News (October 16, 2015), the U.S. Department of Transportation is about to announce a plan to require every purchaser of a drone to register it with the U.S. government. The plan is app...
-
The Intercept yesterday released its latest scoop: a cache of leaked documents on the U.S. drone program, presented as a series of blockbuster stories.
-
Few things have been more emblematic of the military and, indeed, political aspects of the Obama War Powers legacy than drones. As many have noted, the use of this weapons system has vastly increased du...
-
The Intercept’s “Drone Papers” leaker “believes the public has a right to know how the U.S. government decides to assassinate people.” Maybe so—or maybe public safety and the need for secrecy trump the p...
-
The authors of the weak Diffie-Hellman work are almost certainly correct that the technique they describe is used by the NSA, in bulk, to perform a massive amount of decryption on Internet traffic. This...
-
Much ink has been expended over the past few months over the Administration's floated idea of requiring encryption back doors in new technology implementions -- an idea that, for now, the Administration ...