GDPR derogations will be applied throughout the EU. A few potential state-to-state variations will have implications for privacy and security.
On Wednesday, NSA General Counsel Glenn Gerstell delivered the following remarks at the Georgetown Cybersecurity Law Institute in a speech entitled “Failing to Keep Pace: The Cyber Threat and Its Implications for Our Privacy Laws.”
Oh what is a double or triple counting error. It is not like they know PhD researchers in Cambridge. May be their database got hacked!
On the serious side, it is a problem with no clear solution.
In an increasingly interconnected digital world, strong cybersecurity is essential to safeguarding private data, financial transactions, personal communications, and critical infrastructure. Encryption is one of the few technologies we have that reliably protects sensitive data from identity thieves, credit card fraud, and other criminal activity.Against this backdrop, high-ranking officials in the FBI and other law enforcement agencies have claimed for years that criminals are using strong encryption to frustrate information gathering in criminal investigations. They have dubbed this the “Going Dark” problem, conjuring a future in which criminals roam free from the reach of law enforcement.
Source: The FBI’s Gigantic Math Error
The Washington Post reports that the FBI has repeatedly overstated the number of devices it can’t unlock.
Source: The FBI’s Mistake on Encryption
The root cause of the cyber dilemma (military, technical, legal) is that it does not lend itself to clear conceptualizations and definitions required by current frameworks that delineate boundaries and restrain or enable responses.
UK attorney general articulated ground rule positions on otherwise contentious issues that suggest some over analyzing and complicating of current debates.
Healey’s article is about Cybercom and it recommends restricted experimentation/baseline (sunset-able authorizations) of military escalation control.
At the core, the issue is not one of authorizations or capabilities but of definitions. It seems setting some ground rules like the UK, even if on a temporary basis, addresses both at a higher baseline. The required agility will be an immediate and coherent result. The advantage of that enabling approach is that it deals with a wild west of pests not by playing and fine-tuning capabilities in a whack-a-mole game but defining, isolating and clearing the ground first or at least concurrently.
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary attacks without checking back with you and the NSC as much.
Eight key takeaways on the United Kingdom’s position on international law and cyberspace, presented at Chatham House on 23 May 2018.
More than two dozen civil rights organizations asked the tech giant to stop selling its image recognition system to law enforcement agencies.
Does the Cloud Act let the United States enter into an agreement with the EU as a whole?
Drawing on the Supreme Court’s landmark decision in Riley v. California, a recent ruling extends new Fourth Amendment protections to travelers’ electronic devices at the border.
Political consulting group Cambridge Analytica used Russian researchers and shared data with companies linked to Russian intelligence, a whistleblower told a congressional hearing on interference in the 2016 US election Wednesday.
He added that he was aware of “black ops” at the company, “which I understood to include using hackers to break into computer systems to acquire ‘kompromat’ or other intelligence for its clients.”