The Importance of Protecting Cybersecurity Whistleblowers

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because information security has never been so important, or so challenging. In the wake of a… Continue reading The Importance of Protecting Cybersecurity Whistleblowers

The Importance of Protecting Cybersecurity Whistleblowers

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because information security has never been so important, or so challenging. In the wake of a barrage of shocking revelations about data breaches and companies mishandling of customer data, a bipartisan consensus has emerged in support of legislation to give consumers… Continue reading The Importance of Protecting Cybersecurity Whistleblowers

I Was Cited in a Court Decision

An article I co-wrote — my first law journal article — was cited by the Massachusetts Supreme Judicial Court — the state supreme court — in a case on compelled decryption. Here’s the first, in footnote 1: We understand the word "password" t… Continue reading I Was Cited in a Court Decision

I Was Cited in a Court Decision

An article I co-wrote — my first law journal article — was cited by the Massachusetts Supreme Judicial Court — the state supreme court — in a case on compelled decryption. Here’s the first, in footnote 1: We understand the word "password" to be synonymous with other terms that cell phone users may be familiar with, such as Personal Identification… Continue reading I Was Cited in a Court Decision

Reverse Location Search Warrants

The police are increasingly getting search warrants for information about all cell phones in a certain location at a certain time: Police departments across the country have been knocking at Google’s door for at least the last two years with warrants to tap into the company’s extensive stores of cellphone location data. Known as "reverse location search warrants," these legal… Continue reading Reverse Location Search Warrants

Prudent Security Admin: Has a New Data Breach Precedent Been Created?

A recent ruling by the Pennsylvania Supreme Court has the potential to usher in a new era of data breach litigation and set a new legal precedent for cybersecurity negligence and liability. In Dittman v. UPMC, a group of current and former employees s… Continue reading Prudent Security Admin: Has a New Data Breach Precedent Been Created?

El Chapo’s Encryption Defeated by Turning His IT Consultant

Impressive police work: In a daring move that placed his life in danger, the I.T. consultant eventually gave the F.B.I. his system’s secret encryption keys in 2011 after he had moved the network’s servers from Canada to the Netherlands during what he told the cartel’s leaders was a routine upgrade. A Dutch article says that it’s a BlackBerry system. El… Continue reading El Chapo’s Encryption Defeated by Turning His IT Consultant

SpiderOak’s Warrant Canary Died

BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace the warrant canary with a transparency report, they would have written something explaining their decision. To have it simply disappear is what we would expect if SpiderOak were being forced to comply… Continue reading SpiderOak’s Warrant Canary Died