Latest in Bits and Bytes

Bits and Bytes

Cyber War ....

Some entries on the cyber warfare front:

US and China Seek Cyber Arms Deal. "The United States and China are negotiating what could become the first arms control accord for cyberspace, embracing a commitment by each country that it will not be the first to use cyberweapons to cripple the other’s critical infrastructure during peacetime, according to officials involved in the talks." [To be verified how?]

Bits and Bytes

Bits and Bytes

The Lopht warns of cyber insecurity ... in 1998.  A fantastic review article about how we got to where we are today.  "The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank.

Bits and Bytes

Bits and Bytes

China Worried By New US Cyber Strategy.  "China's Defence Ministry expressed concern on Thursday at the Pentagon's updated cyber strategy that stresses the U.S. military's ability to retaliate with cyber weapons, saying this would only worsen tension over Internet security."  Maybe this is a good thing ....

Bits and Bytes

Bits and Bytes

Neustar looks to lose its contract. "Federal Communications Commission staff has recommended that a $450 million contract Sterling-based company Neustar has held exclusively for 18 years be awarded to rival Ericsson."  Readers will recall that the Neustar contract has cybersecurity implicaitons.

Bits and Bytes

Bits and Bytes

FTC v. Wyndham.  The Third Circuit heard oral argument the other day in this long-running case that will test whether or not the FTC can use its "unfair" business practices authority to sanction companies that allegedly take inadequate cybersecurity measures.  If the FTC loses, I predict the FCC will fill the void ....

Bits and Bytes

Bits and Bytes

If you weaken crypto ... you weaken crypto.  "Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov."  The vulnerability (deliberate use of 512-bit encyrption) is the result of our Crytpo Wars back in the 1990s.

Bits and Bytes

Bits and Bytes

Are Submarines Becoming Obsolete?  Perhaps, in light of enhanced data processing capabilities.  "[T]he ability of submarines to hide through quieting alone will decrease as each successive decibel of noise reduction becomes more expensive and as new detection methods mature that rely on phenomena other than sounds emanating from a submarine.

Subscribe to Lawfare

EmailRSSKindle