-
On Thursday, the Justice Department announced charges against two Chinese government-associated hackers for conspiring to commit computer intrusions. Video of the press conference is below.
-
Last month, more than 50 countries and over 200 major corporations and organizations came together to agree that the international nature of cyber threats needs a cooperative global response and a common...
-
The meeting between President Trump and President Xi Jinping at the G20 summit in Buenos Aires kicked off a slew of activity on the trade war front. On Dec. 1, the two leaders agreed to a 90-day truce du...
-
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
-
Cybersecurity law and policy is a fun subject to teach. There is vast room for creativity in selecting topics, readings and learning objectives. But that same quality makes it difficult to decide what to...
-
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
-
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
-
Flat light is the state of disorientation, feared among pilots, in which all visual references are lost. The effects of flat light “completely obscure features of the terrain, creating an inability to di...
-
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
In any discussion of cyber security, details matter.
-
In August 2018, the leading international academic conference on cryptography hosted a Workshop on Encryption and Surveillance. The workshop explored both legal and technical aspects of the ongoing debat...
-
On Nov. 19, the Commerce Department published a notice seeking public comment on proposed export controls under fourteen categories of emerging technologies.
-
The new U.S. Cyber Command (USCYBERCOM) vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.