Crossroads Blog | CYBER SECURITY LAW AND POLICY

The Very Wicked Problem of Search and Seizure in Cyberspace

The Facts In April, the Advisory Committee on Criminal Rules proposed amendments to the Federal Rules of Criminal Procedure that would give authorities “more leeway to secretly hack into the suspected criminal’s computer,” so The Hacker News in a recent report. According to the draft minutes of the Criminal Rules Meeting, the subcommittee on Rule […]

Read More

How Snowden Divides the German NSA Inquiry Panel

On March 20, 2014, the German Bundestag, the country’s federal parliament, formed a parliamentary investigative commission to probe the surveillance activities of the 5-eyes states, in particular of the National Security Agency (NSA) and the British Government Communication Headquarters (GCHQ), that targeted and involved Germany. The inquiry panel has taken up work, as the German Attorney General has […]

Read More

The Heartbleed Bug and the Political Implications of Vulnerability Management

Today, the Canadian Broadcasting Corporation (CBC) recounted the happenings around the Heartbleed Bug, a pervasively occurring vulnerability of the widespread OpenSSL cryptographic software that was revealed by Google and a Finnish security firm on Monday. Along with the public notification, the information website heartbleed.com was established, explaining that “[t]he Heartbleed bug allows anyone on the Internet […]

Read More

Cyber Dialogue 2014 (Day 2 of 2)

Following yesterday’s introduction and preparation on day 1 of the Cyber Dialogue 2014, the conference participants started day 2 in their assigned working groups, covering specific challenges to effective oversight mechanisms (group 1: “From Surveillance to Cyber War: What are the Limits and Impacts?”), or more general topics like viable governance models (group 5: “Power Shift? […]

Read More

Exploit Sales: The Unnoticed Side of the Trade in Surveillance Technologies

The Issue Last week, London-based surveillance watchdog Privacy International raised awareness of governments’ and private spyware suppliers’ engagement in an unregulated market that supplies them with intelligence on security flaws of widely-used software. Such exclusive knowledge about generally unknown vulnerabilities is a crucial part of any cyber eavesdropping operation. It allows the operator to access […]

Read More
Please wait...