Crossroads Blog | CYBER SECURITY LAW AND POLICY

AI, Cybersecurity, Fourth Amendment, gorsuch

Cyber Round Up: Gorsuch on Cyber Part Two; Obama issued late Operational Directives on Cyber; AI and Cyber: Changing the Locks

  • Gorsuch on Cyber-Related Issues: Part Two (Lawfare):  Two weeks ago, we recapped the first in a series of posts covering Supreme Court Justice nominee Neil Gorsuch and his depth of knowledge in cyber.  The second part was posted last week and covered computer searches, specifically in the context of timeliness and particularity. The post discusses Gorsuch’s decision in U.S. v. Christie, where he analyzes two separate lines of cases that are relevant to the issue. The blog also noted that Gorsuch makes a “bold” argument that not just the “what” of the search matters, but also the “how.”  The full blog post, including some analysis of other Gorsuch decisions, can be read here.
  • DHS issued two more Binding Operational Directives on cyber in final months of Obama term (Federal News Radio): DHS is benefiting from expanded authority given to it by Congress in 2014.  That authority, an article explains, gives DHS the ability to force other agencies to improve their cyber security measures. The article explained that while two directives were already made public, former DHS Secretary Jeh Johnson issued two more late in the Obama administration’s tenure.  The first ordered agencies to remedy vulnerabilities in Cisco products.  The second mandated compliance with the 2014 Federal Information Security Modernization Act.    The full report can be read here.

  • How AI can ‘change the locks’ in cybersecurity (Venture Beat):  Artificial Intelligence continues to gain traction as potential solution to cyber security challenges. A recent article explains how AI systems can help compensate the inevitable flaws that come from human error and security. The report uses the analogy of moving into a neighborhood where everyone has the same locks, and says this is the way security software works.  AI offers a solution to this program, which the article describes as a “moving defense.” The full article can be found here.

Leave a Reply