Logo - The White House - Barack Obama

Presidential Policy Directive 41 – United States Cyber Incident Coordination

While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.

Presidential Policy Directive 41 – United States Cyber Incident Coordination Read More
Book Cover - Dark Mirror by Barton Gellman

Dark Mirror: Edward Snowden and the American Surveillance State

Edward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication. They shared the Pulitzer Prize that year for public service. For Gellman, who never stopped reporting, that was only the beginning.

Dark Mirror: Edward Snowden and the American Surveillance State Read More
CyberLaw Podcast Logo

CyberLaw Podcast

The Cyberlaw Podcast is a weekly interview series and discussion on the latest events in technology, security, privacy, and government. The podcast is hosted by Steptoe & Johnson LLP partner Stewart Baker, who is joined by a wide variety of guests including academics, politicians, authors, and reporters. You can subscribe to the podcast here. It is also available on iTunes, Google Play, Spotify and other podcast platforms.

CyberLaw Podcast Read More
Workers at the Idaho National Laboratory’s Critical Infrastructure Test Range. (Flickr/Idaho National Laboratory, CC BY 2.0)

The Myth of Consumer-Grade Security

Schneier on Security, August 28, 2019
By Bruce Schneier

“The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that’s not possible, because there is no longer any difference between those categories of devices. Consumer devices are critical infrastructure. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement.”

The Myth of Consumer-Grade Security Read More
DoD Cyber Strategy - 2018

DoD Cyber Strategy – 2018

Cyber Strategy: Summary, 2018
U.S. Department of Defense

“American prosperity, liberty, and security depend upon open and reliable access to information.  The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services.  Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”

DoD Cyber Strategy – 2018 Read More