-
INTRODUCTION
-
A helpful reader drew our attention to this last minute addition to the Carper CISA amendment authorizing DHS Einstein. Coincidence or Lawfare readers in our midst?
SEC. 208. IDENTIFICATION OF INFORMATI...
-
When we announced our contest to pick the best US database for the Chinese PLA to hack, little did we know that we would get so many interesting, and indeed scary, entries. The possibilites were so many ...
-
Over the past few weeks, I have been up to my neck in encryption.
-
The good people at Just Security, a fellow online security blog, recently moved their entire website to "HTTPS". This means you'll always see "https://" in your browser when you visit, with a little lock...
-
Suppose you were the National Telecommunications and Information Administration (NTIA)—a unit of the U.S. Department of Commerce. Suppose further that in March 2014 you had announced your intention to of...
-
What follows is a guest post from Nicholas Weaver, a computer security researcher at the International Computer Science Institute in Berkeley:
Properly configured, an iOS device is perhaps the most sec...
-
Hacking the hackers. Companies are getting more aggressive in responding to attacks, but the law limits how far they can go.
-
It isn't every day you have an exchange with a journalist who just comes out and admits—twice, actually—that a story in his publication contains made up facts.
-
A few days ago, Ashley had an excellent post flagging an important shift in U.S.
-
The results are in. Lawfare's “Name that Database” contest is now closed.
All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really qui...
-
We expected our piece on liability standards with respect to encryption would provoke strong reactions. We did not expect ad hominim attacks, outright lies, or a near-total failure to engage our legal an...