INCYDER, Comprehensive Tool for Cyber Security Research
From NATO Cooperative Cyber Defence Centre of Excellence: The brand new web-based INCYDER (International Cyber Developments Review) database is now open to public for free. The portal, developed and...
View ArticleDraft AUMF from White House
On February 11, 2015, the President of the United States sent a letter to Congress “submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.” Recall...
View ArticleWhat’s wrong with the NSA monitoring Internet traffic?
Questions for today: What is the difference between the NSA monitoring Internet traffic and the state police monitoring traffic along an interstate highway? Especially when the NSA looks only at...
View ArticleToward a Social Compact for Digital Privacy and Security – STMT from Global...
We noted in January of 2014 that Chatham House, the international famous UK think-tank, had assembled a Global Commission on Internet Governance. On April 14, 2015, the Commission released a statement...
View ArticleActual U.S. DoD Cyber Strategy
We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it...
View ArticleKerry on U.S. International Cybersecurity Policy: Full video
“The United States considers the promotion of an open and secure internet to be a key component of our foreign policy,” said Secretary of State John Kerry on May 18, 2015, in South Korea. Although the...
View ArticleActual text of USA FREEDOM Act of 2015
Click on the thumbnail to read the actual text of the ‘‘Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015’’ or the ‘‘USA FREEDOM Act...
View ArticleFBI’s Comey Today on Going Dark, Encryption
Delivered today, July 08, 2015: Going Dark: Encryption, Technology, and the Balances Between Public Safety and Privacy Joint Statement of James B. Comey, Director, Federal Bureau of Investigation, with...
View ArticleDark Web: A new CRS Report
Dark Web is a new report from the Congressional Research Service dated July 7, 2015. (Most of you are probably aware that CRS reports are not released to the public but tend to get linked and...
View ArticleFBI unable to hire number of computer scientists authorized, according to...
The Federal Bureau of Investigation had only hired 52 of the 134 computer scientists it was authorized to employ under the Justice Department’s Next Generation Cyber Initiative launched in 2012,...
View ArticleNATO Conference on Cyber Conflict materials now available.
The NATO Cooperative Cyber Defence Centre of Excellence in Estonia has now posted online many materials from its 2015 Conference on Cyber Conflict. This year’s topic, “Architectures in Cyberspace,”...
View ArticleAmerica’s strategy for cyberspace: Is it working? – A Talk by Michael Hayden
“We just haven’t settled on the big concepts yet,” was former CIA and NSA director Michael Hayden’s message about cyber security to the American Enterprise Institute on October 27, 2015. His talk was...
View ArticleExecutive Order — Establishment of the Federal Privacy Council
Today, 2/9/16, U.S. President Obama issued this executive order: For Immediate Release February 09, 2016 Executive Order — Establishment of the Federal Privacy Council EXECUTIVE ORDER – – – – – – –...
View ArticleObama Executive Order — Commission on Enhancing National Cybersecurity
Today, 2/9/16, U.S. President Obama issued an executive order creating a commission on enhancing national security. Note that it resides within the Department of Commerce, not the military or the...
View ArticleApple’s Odd First Amendment Argument
I have been saying that there is no Constitutional issue in the case In The Matter of the Search of an Apple Iphone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California...
View ArticleActual Motion Filed by Apple in AppleVsFBI
Actual pleading filed by Apple in federal court on February 25, 2016, APPLE INC’S MOTION TO VACATE ORDER COMPELLING APPLE INC. TO ASSIST AGENTS IN SEARCH, AND OPPOSITION TO GOVERNMENT’S MOTION TO...
View ArticleWrong, Apple. There is no 4th Amendment Issue.
Commentary In its motion filed yesterday, Apple states: “Nor does society tolerate violations of the Fourth Amendment, even though the government could more easily obtain critical evidence if given...
View ArticleActual Order that Apple Need Not Assist FBI Search iPhone in Brooklyn Drug Case
Here is the actual order in IN RE ORDER REQUIRING APPLE, INC. TO ASSIST IN THE EXECUTION OF A SEARCH WARRANT ISSUED BY THIS COURT. The judge decided this case as a matter of statutory construction and...
View ArticleFBI Dir. Comey’s testimony today: “Encryption Tightrope: Balancing Americans’...
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED “ENCRYPTION TIGHTROPE: BALANCING...
View ArticleVideo of Hearing “The Encryption Tightrope: Balancing Americans’ Security and...
The U.S. House of Representatives Judiciary Committee held a hearing on March 1, 2016, entitled “The Encryption Tightrope: Balancing Americans’ Security and Privacy.” Witnesses included FBI Director...
View Article