The Myth of Cyberterror

UPI’s article on cyberterrorism helpfully states the obvious: there’s no such thing. This is in sharp contrast to the rhetoric in cybersecurity discussions, which highlights purported threats from terrorists to the power grid, the transportation system, and even the ability to play Space Invaders using the lights of skyscrapers. It’s all quite entertaining, except for […]

WikiLeaks and the Pentagon Papers

For those interested in whistleblowing, WikiLeaks, and the role journalists can play as the Internet saps traditional media, I shamelessly recommend Consider the Censor, an essay I wrote in the Wake Forest Journal of Law & Policy that is now available on-line.

Cybersecurity Theory and Myths

David Opderbeck put together a terrific cybersecurity conference at Seton Hall today. I was on a panel discussing cybersecurity policy and legal theory. The audience was primarily law enforcement and practicing attorneys, so I asked, “What are you doing here?” In good academic fashion, I proceeded to (try to) answer my own question – why […]

The Kinetics of Cyberwar

The Wall Street Journal reports that the Department of Defense has formalized its doctrine for responding to cyber-attacks. (Hat tip: Thinh Nguyen.) Unsurprisingly, the Pentagon has adopted a pragmatic posture of equivalence: cyber-attacks of sufficient impact could meet with a kinetic response. In other words, logic bombs might prompt America to employ real ones. The […]

Hacking the Grid

Normally, bloviating about security follows a simple rule: disagreeing with Bruce Schneier = wrong. But I do disagree with Bruce about the recent decision by security researcher Dillon Beresford to withhold details about a vulnerability he discovered in Siemens’ SCADA (Supervisory Control And Data Acquisition Systems) controllers. These are the same type of systems that […]

Cybersecurity in Santa Clara

I’m here at Eric Goldman and Dan Hunter‘s great Works-in-Progress in Internet Law conference at Santa Clara Law. My talk is about my cybersecurity paper, Conundrum, which I’ll be posting to SSRN after incorporating feedback from the confab. I’m looking forward to David Opderbeck‘s piece as well, and just learned a lot about data anonymization […]


I’m speaking on a panel discussing WikiLeaks this Thursday. It’s free, and will be good fun. Please come! What: WikiLeaks? WikiWhat? WikiWho? WikiWhy? When: Thursday, 17 February 2011, 7:00 – 8:30PM Where: N.Y. County Lawyers’ Association, 14 Vesey Street, New York, NY Sponsors: Network of Bar Leaders, N.Y. County Lawyers’ Association, and Voterbook RSVP: Jeff […]

WikiLeaks and the Pentagon Papers

Note: I forgot to mention that the piece is coming out this spring in the Wake Forest Journal of Law & Policy. Thanks to Jim Bauer and his team for their hard work on it! (Updated 15 Feb. 2011.) Hat tip: to Larry Solum and Josie Brown for linking to the piece on their blogs. […]

Rafal Rohozinski on Internet Surveillance and Monitoring

My former ONI colleague Rafal Rohozinski, now of Information Warfare Monitor, has a great interview where he discusses methodology and findings for both projects. Well worth a read!

AT&T: Safe, But Mocked

Works in more places… I suppose the fake place name would be NSFrancisPying. (Hat tip to an anonymous friend!) The Supreme Court declined to hear an appeal of the Sixth Circuit’s ruling that the plaintiffs in the NSA suit here in Michigan lacked standing. The hard part, of course, is it’s extremely difficult to prove […]