-
Readers will recall last spring's battle over the San Bernardino iPhone. The FBI had Syed Farook's work phone, but it was locked, with security protections including a ten-tries-and-you're-out on PIN att...
-
Michael Specter and the “Keys Under Doormats” (KUD) group have an interesting post, entitled “Apple's Cloud Key Vault, Exceptional Access, and False Equivalences” responding to my earlier post on Apple’s...
-
-
Two years ago, the Obama Administration announced its decision to allow a contract with the Internet Corporation for Assigned Names and Numbers (ICANN) to lapse. The practical implicaiton of that decisio...
-
The Defense Science Board recently identified five “stretch problems”—goals that are “hard-but-not-too-hard” and that have a purpose of accelerating the process of bringing a new autonomous capability in...
-
For those interested—a (prepublication) review paper on attribution of malicious cyber incidents that synthesizes a number of previous works on the subject and adds a few new insights on the topic. Abstr...
-
9th Circuit and the CFAA
This summer the 9th Circuit released two significant opinions on the Computer Fraud and Abuse Act (CFAA), which prohibits acts of computer trespass by those who are not authoriz...
-
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Andr...
-
The recent penetrations of state voter registration databases in Arizona and Illinois have, so far, been limited to data exfiltration. Much of the information contained in voter registration databases is...
-
Lawfare is pleased to announce the publication of a new working paper in the Lawfare Research Paper Series: Presidential Elections: A Perilous Time for U.S. Intelligence, by Eric Manpearl.
From the abst...
-
From a recent story on fedscoop:
-
The New York Times has a report today that is a comprehensive look at Russian disinformation campaigns. It begins: