Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Some data acquisition/transfer device at CERN (CMS experiment).

In “Cyber Weapons and Export Control,” Trey Herr and Paul Rosenzweig take up the complex task of characterizing software products in the context of the current export regulatory regime. Herr and Rosenzweig use their PrEP model to distinguish the components of the software functionally. They isolate the payload component as requiring special consideration, and propose a… Continue reading Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

As the field of privacy and digital surveillance grows increasingly chaotic, Michael Price proposes a compelling supplement to the third-party doctrine. Eschewing the popular position that our privacy clashes are generational, Price instead reviews the history of Fourth Amendment jurisprudence to identify missteps in doctrine that have led us to the current impossible position. Along… Continue reading Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Landau explains the National Security Agency’s little-known function of providing communications security (COMSEC) to private companies, which has involved an improvement of security and privacy of the domestic communications infrastructure. She examines the history of the program and how the NSA’s behavior towards the private sector has shifted since the 1950’s, as well as the… Continue reading Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure