The Volokh Conspiracy
Mostly law professors | Sometimes contrarian | Often libertarian | Always independent
Congress's 2021 cybersecurity agenda
Episode 358 of the Cyberlaw Podcast
Our interview is with Mark Montgomery and John Costello, both staff to the Cyberspace Solarium Commission. The Commission, which issued its main report more than a year ago, is swinging through the pitch, following up with new white papers, draft legislative language, and enthusiastic advocacy for its legislative recommendations, many of which were adopted last year. That makes it the most successful of the many cybersecurity commissions that have come and gone in Washington. And it's not done yet. Mark and John review several of the most important legislative proposals the Commission will be pursuing this year. I don't agree with all of them, but they are all serious ideas and it's a good bet that a dozen or more could be adopted in this Congress.
In the news roundup, David Kris and I cover the FBI's use of a single search warrant to remove a large number of web shells from computers infected by China's irresponsible use of its access to Microsoft Exchange. Deploying a search warrant (or, more accurately, a seizure warrant)requires a far-reaching interpretation of federal criminal Rule 41. But despite valiant efforts, David is unable to disagree with my earlier expressed view that the tactic is lawful.
Brian Egan outlines what's new in the Biden administration's sanctions on Russia for its SolarWinds exploits. The short version: While some of the sanctions break new ground, as with the restrictions on Russian bonds, they do so cautiously.
Paul Rosenzweig, back from Costa Rica, unpacks a hacking story that has everything – terrorism, the FBI, Apple, private sector hacking, and litigation. Short version: we now know the private firm that saved Apple from being ordered to hack its own phone. The hacking was done instead by an Australian firm named Azimuth that apparently only works for democratic governments but that is nonetheless caught up in Apple's bully-the-cybersecurity-researchers litigation campaign.
Gus Hurwitz talks to us about the seamy side of content moderation (or at least one seamy side) – the fight against "coordinated inauthentic behaviour."
In quicker takes, Paul gives us a master class in how to read the intel community's Annual Threat Assessment. David highlights what may be the next Chinese telecom manufacturing target, at least for the GOP. I highlight the groundbreaking financial industry breach notification rule that has now finished the comment period and is moving toward adoption. And Gus summarizes the state of Silicon Valley antitrust legislation: Everyone has a bill, so no one is likely to get a bill.
Download the 358th Episode (mp3)
You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug!
The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of Reason.com or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Yet another total failure of the lawyer to protect our nation from billions of federal crimes a year. The average bank robbery nets $4000, with a lot of work, and risk. The net from an identity theft is $5000 with zero risk thanks to the failed lawyer profession.
Get rid of these pro-criminal lawyers. Then kill the hackers. To deter.
Their agenda should include this Office 365 backup solution from https://spinbackup.com/products/office-365-backup/. I found it to be successful with most of the tasks I needed it for.
Depositions. Litigation. Bah! A Jedi craves not these things.
Nothing will change until CEOs are sent to jail and bankrupted for failing to secure their systems and their users. The heads of Equifax, OPM and solarwinds should be doing 10 years. Most US banks can't be bothered to implement a software token based 2FA.
https://2fa.directory/#banking
They will never be held accountable unless the rule of law totally collapses.
"The hacking was done instead by an Australian firm named Azimuth that apparently only works for democratic governments but that is nonetheless caught up in Apple's bully–the-cybersecurity-researchers litigation campaign."
The link(s) to the article about the bully-the-cybersecurity-researchers just lead to a 404, so not 100% sure about the details, but based on overall stance on these issues, I feel like:
- Baker really likes the anti-DRM-circumvention provision of the DMCA and favors an expansive reading of the CFAA, but
- Is really, really mad that Apple would dare make use of either of these laws against researchers in the pockets of the national security regimes he favors