Quantcast
Channel: badware – Info/Law
Browsing all 18 articles
Browse latest View live

Protecting Hackers From Lawyers

Oliver Day and I are giving a talk at the Berkman Center for Internet & Society at Harvard Law School (our former home) on our proposed shield law to protect software security research. (The longer...

View Article



Protecting Hackers from Lawyers

Oliver Day and I presented the idea behind our article The Hacker’s Aegis (now available from Emory Law Journal – the cite, for law nerds, is 60 Emory L.J. 1051 (2011)) at the Berkman Center for...

View Article

What Is A “Hack”?

Rick Reilly. (Sorry, that’s *who* is a hack.) But, Adam Penenberg has a great article at Fast Company about the increasingly amorphous definition of “hacking”: it can cover everything from social...

View Article

Hacking Bloomberg Law

I had a fun podcast interview with Spencer Mazyck of Bloomberg Law about this summer’s wave of hacking. We talk about who hacks and why, what companies can do about it (treat it like disaster...

View Article

Spying, Skynet, and Cybersecurity

The drones used by the U.S. Air Force have been infected by malware – reportedly, a program that logs the commands transmitted from the pilots’ computers at a base in Nevada to the drones flying over...

View Article


The Myth of Cyberterror

UPI’s article on cyberterrorism helpfully states the obvious: there’s no such thing. This is in sharp contrast to the rhetoric in cybersecurity discussions, which highlights purported threats from...

View Article

Cyber-Terror: Still Nothing to See Here

Cybersecurity is a hot policy / legal topic at the moment: the SEC recently issued guidance on cybersecurity reporting, defense contractors suffered a spear-phishing attack, the Office of the National...

View Article

How Not To Secure the Net

In the wake of credible allegations of hacking of a water utility, including physical damage, attention has turned to software security weaknesses. One might think that we’d want independent experts –...

View Article


Goldilocks and Cybersecurity

It may seem strange in a week where Megaupload’s owners were arrested and SOPA / PROTECT IP went under, but cybersecurity is the most important Internet issue out there. Examples? Chinese corporate...

View Article


Hollywood Comes to Brooklyn

Catchy title, no? Today, Al Perry, Vice President of Worldwide Content Protection and Outreach at Paramount Pictures, came to BLS to talk about movies, piracy, and the Internet. He spoke for about 40...

View Article

Cyberwar and Cyberespionage

My paper “Ghost in the Network” is available from SSRN. It’s forthcoming in the University of Pennsylvania Law Review. I’m appending the abstract and (weirdly, but I hope it will become apparent why)...

View Article

Shark Tanks and Cybersecurity

It’s the most wonderful time of the year… for data breaches. Target may have compromised as many as 40 million credit and debit cards used by shoppers in their stores. What liability will they face? At...

View Article

Cybercrime’s International Challenges

Jane and I are in Cluj-Napoca, Romania, for a conference titled “Crimes, Criminals, and the New Criminal Codes: Assessing the Effectiveness of the Legal Response” at Babes-Bolyai University. Jane is...

View Article


On Accuracy in Cybersecurity

I have a new article on how to address questions of accuracy in cybersecurity up on SSRN. It’s titled Schrödinger’s Cybersecurity; here’s the abstract: Both law and cybersecurity prize accuracy....

View Article

Celebrities, Copyright, and Cybersecurity

The fall began with a wave of hacked nude celebrity photos (as Tim notes in his great post). The release generated attention to the larger problem of revenge porn – or, more broadly, the non-consensual...

View Article


The Crane Kick and the Unlocked Door

Cybersecurity legislative and policy proposals have had to grapple with when (if ever) firms ought to be held liable for breaches, hacks, and other network intrusions. Current approaches tend to focus...

View Article

Sharing Shortcomings

I have a new essay coming out in Loyola University Chicago Law Journal titled Sharing Shortcomings. Comments and feedback are very much welcomed. Here’s the abstract: Current cybersecurity policy...

View Article


The iPhone Writ Large

Apple and the Department of Justice are dueling over whether the iPhone maker must write code to help the government break into the San Bernadino shooter’s phone. The government obtained a warrant to...

View Article
Browsing all 18 articles
Browse latest View live




Latest Images