Quote of the Day – on Online Commercial Surveillance:

From the ever interesting Maciej Ceglowski at his [Idle Words](http://idlewords.com/talks/what_happens_next_will_amaze_you.htm):

> “The proximate reasons for the culture of total surveillance are clear. Storage is cheap enough that we can keep everything. Computers are fast enough to examine this information, both in real time and retrospectively. Our daily activities are mediated with software that can easily be configured to record and report everything it sees upstream. But to fix surveillance, we have to address the underlying reasons that it exists. These are no mystery either. State surveillance is driven by fear. And corporate surveillance is driven by money.”

Read the whole thing, including details of his six, sensible, suggested fixes: (1) the right of users of an online site or service to download data (in usable format) that was provided to or collected by the online site or service; (2) the right at any time to delete one’s account (and all associated personal information) from an online service; (3) a ban on selling or sharing behavioral data, as well as relatively short limits on its storage (e.g., 90 days); (4) physical turn-internet-connectivity-off switches for IoT connected devices (which should be required to remain functioning in the off state); (5) a ban on third-party ad tracking (with sites only able to target ads based on page content itself and information the site has about the visitor), and (6) legally enforceable privacy promises with significant penalties that act as meaningful deterrents.

Also: Watch his presentation on “The Website Obesity Crisis” at [Vimeo](https://vimeo.com/147806338?ref=tw-share) (53 minutes)

FAA Requires (Non-Commercial) Drone Registration

**FAA [Press Release](http://www.faa.gov/news/press_releases/news_story.cfm?newsId=19856)**

**FAA Interim Final Rule** ([pdf](http://www.faa.gov/news/updates/media/20151213_IFR.pdf); 211 pages)

**Media:**

> New York Times [short summary](http://bits.blogs.nytimes.com/2015/12/15/daily-report-rules-for-registering-your-drone/?module=BlogPost-Title&version=Blog%20Main&contentCollection=Daily%20Report&action=Click&pgtype=Blogs&region=Body)

> [Mandatory Drone Registration Begins](http://spectrum.ieee.org/automaton/robotics/aerial-robots/faa-mandatory-drone-registration) – practical aspects from IEEE Spectrum

**Legality:** From earlier this year, [Is a Drone Registration Mandate Illegal?](https://cei.org/blog/drone-registration-mandate-illegal) – Competitive Enterprise Institute. See also, [Critics Threaten Lawsuit Over Drone Registration Rules](http://thehill.com/policy/transportation/263164-critics-threaten-lawsuit-over-faa-drone-registration-rules) – The Hill

**Related – On Drones:**

> [CDT Proposes Privacy Best Practices for Drones](https://cdt.org/blog/cdt-proposes-privacy-best-practices-for-drones/) – CDT (Center for Democracy & Technology). The pdf (12 pages) of CDT’s “Model Privacy Best Practices for Unmanned Aircraft” is available [here](https://cdt.org/insight/model-privacy-best-practices-for-unmanned-aircraft/)

> WireCutter’s [The Best Drones](http://thewirecutter.com/reviews/best-drones/#); scroll towards the bottom for the useful **How to Fly Safely (and Know Your Rights)**

> [A Field Guide to Civilian Drones](http://www.nytimes.com/interactive/2015/technology/guide-to-civilian-drones.html?emc=edit_tu_20151124&nl=bits&nlid=34482325&_r=0) – New York Times

> [FAA Approved Commercial Drone Exemptions](http://www.theverge.com/2015/7/7/8883821/drone-search-engine-faa-approved-commercial-333-exemptions) – Verge

> [Amazon Proposes Drone Highway As It Readies For Flying Package Delivery](http://www.forbes.com/sites/ryanmac/2015/07/28/amazon-proposes-drone-highway-as-it-readies-for-flying-package-delivery/) – Forbes

> **Academic Paper:** [Self-Defense Against Robots and Drones](http://works.bepress.com/amichael_froomkin/2/) (pdf; 80 pages) – A. Michael Froomkin & Zak Colangelo; see also [If I Fly a UAV Over My Neighbor’s House, Is It Trespassing?](http://www.theatlantic.com/technology/archive/2012/10/if-i-fly-a-uav-over-my-neighbors-house-is-it-trespassing/263431/) – The Atlantic

**Drone Wars:** [The Drone Papers series](https://theintercept.com/drone-papers/) – The Intercept

12/15/2015: 

EU Court of Justice Safe Harbor Ruling (link round-up)

[**The Judgment**](http://curia.europa.eu/juris/document/document.jsf?docid=169195&mode=req&pageIndex=1&dir=&occ=first&part=1&text=&doclang=EN&cid=386060) of the Court of Justice of the European Union (October 6, 2015)

[**Press Release**](http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf) of the Court of Justice of the European Union

[**Interview**](http://blogs.wsj.com/brussels/2015/10/14/ecj-president-on-eu-integration-public-opinion-safe-harbor-antitrust/) (Wall Street Journal) with the new President of the European Court of Justice

**News Reports:**

> [Data Transfer Pact Between U.S. and Europe Is Ruled Invalid](http://www.nytimes.com/2015/10/07/technology/european-union-us-data-collection.html?_r=0) – New York Times

> [This Privacy Activist Has Just won an Enormous Victory Against U.S. surveillance – Here’s How](https://www.washingtonpost.com/blogs/monkey-cage/wp/2015/10/06/this-privacy-activist-has-just-won-an-enormous-victory-against-u-s-surveillance-heres-how/) – Washington Post

**Layperson Explainer:**

> [US and EU in Data Privacy Clash: What You Need to Know](http://www.cnbc.com/2015/10/07/eu-safe-harbor-ruling-what-is-it-and-what-does-it-mean-for-us-tech-firms.html) – CNBC

**Subsequent Developments – What Now?**

> [Privacy Watchdogs Give EU, US Three Months to Negotiate New Safe Harbor Deal
If There’s No New Deal by the End of January, National Data Protection Authorities Threaten Coordinated Legal Action Against Offending Companies](http://www.pcworld.com/article/2994815/privacy-watchdogs-give-eu-us-three-months-to-negotiate-new-safe-harbor-deal.html) – PCWorld

> [Europe’s Top Digital-Privacy Watchdog Zeros In on U.S. Tech Giants](http://www.nytimes.com/2016/01/25/technology/europes-top-digital-privacy-watchdog-zeros-in-on-us-tech-giants.html?_r=0) – New York Times

> [U.S. Tech Firms Look To Data Centers on European Soil](http://blogs.wsj.com/digits/2015/10/06/u-s-tech-firms-look-to-data-centers-on-european-soil/) – Wall Street Journal

**Plaintiff Max Schrems:**

> [Tech Companies Like Facebook Not Above the Law, Says Max Schrems; Austrian Student Who Took on Facebook over Data Privacy in the European Court of Justice and Won Says the Fightback is Just Beginning](http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice) – The Guardian

> [First Thoughts on Decision C-362/14](http://www.europe-v-facebook.org/EN/Complaints/PRISM/Response/response.html) – Max Schrems at [Europe v. Facebook](http://www.europe-v-facebook.org/EN/en.html); Also see [more Max Schrems reaction and background](http://www.europe-v-facebook.org/CJEU_IR.pdf) (pdf)

**Big Tech Reaction:**

> [The Collapse of the US-EU Safe Harbor: Solving the New Privacy Rubik’s Cube](http://blogs.microsoft.com/on-the-issues/2015/10/20/the-collapse-of-the-us-eu-safe-harbor-solving-the-new-privacy-rubiks-cube/) – Microsoft President and Chief Legal Officer, Brad Smith

> [Eric Schmidt Thinks a Ruling by Europe’s Top Court Threatens ‘One of the Greatest Achievements of Humanity’](http://www.businessinsider.com/eric-schmidt-ecj-safe-harbor-ruling-threatens-one-of-the-great-achievements-of-humanity-2015-10) – Business Insider

**Other Reaction and Analysis:**

> [Here’s How the Facebook Case has Just Transformed the Surveillance Debate](https://www.washingtonpost.com/blogs/monkey-cage/wp/2015/10/06/heres-how-the-facebook-case-has-just-transformed-the-surveillance-debate/) – Washington Post

> [No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans’ Privacy](https://www.eff.org/deeplinks/2015/10/europes-court-justice-nsa-surveilance) – EFF

> [Behind the European Privacy Ruling That’s Confounding Silicon Valley](http://www.nytimes.com/2015/10/11/business/international/behind-the-european-privacy-ruling-thats-confounding-silicon-valley.html?partner=rss&emc=rss&_r=0) – New York Times

> [Fallout From EU-US Safe Harbor Ruling will be Dramatic and Far-Reaching; Clever Ruling by the Court of Justice will be Almost Impossible to Circumvent](http://arstechnica.com/tech-policy/2015/10/fallout-from-eu-us-safe-harbour-ruling-will-be-dramatic-and-far-reaching/) – ArsTechnica

> [Schrems v. Data Protection Commissioner – Some Inconvenient Truths The European Court of Justice Ignores](https://www.lawfareblog.com/schrems-v-data-protection-commissioner-some-inconvenient-truths-european-court-justice-ignores) and [Surveillance Reform Is Only Hope for Reviving Safe Harbor](https://www.lawfareblog.com/surveillance-reform-only-hope-reviving-safe-harbor) – both by Timothy Edgar at LawFare

> [Adding Some Nuance on the European Court’s Safe Harbor Decision](https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/) – Megan Graham at LawFare

> [Europe’s Top Court Goes Off the Rails](http://www.politico.eu/article/ecj-off-the-rails-safe-harbor-eu-us-data-protection/) – Richard Epstein at Politico

> [The Party’s Over: EU Data Protection Law after the Schrems Safe Harbour Judgment](http://eulawanalysis.blogspot.ca/2015/10/the-partys-over-eu-data-protection-law.html) – EULaw.Analysis

> [My FT Oped on the Safe Harbor Fallout](http://evgenymorozov.tumblr.com/post/130831987855/my-ft-oped-on-the-safe-harbor-fallout) – Evgeny Morozov

> [Europe Has to Rebuild Its Safe Harbor](http://www.bloombergview.com/articles/2015-10-19/europe-has-to-rebuild-its-safe-harbor) – BloombergView Editorial Board

> [Enacting ECPA Reforms Will Help Resolve the US-EU Safe Harbor Negotiations](http://thehill.com/blogs/congress-blog/technology/263776-enacting-ecpa-reforms-will-help-resolve-the-us-eu-safe-harbor) – The Hill

10/20/2015: 

Ad Tracking/Blocking War (link round-up)

**The Problems:**

> [20 Home Pages, 500 Trackers Loaded: Media Succumbs to Monitoring Frenzy](http://www.mondaynote.com/2015/07/20/20-home-pages-500-trackers-loaded-%E2%80%A8media-succumbs-to-monitoring-frenzy/) – Frédéric Filloux at Monday Note

> [The Verge’s Web Sucks](http://blog.lmorchard.com/2015/07/22/the-verge-web-sucks/) – blog.lmorchard.com

> [The Cost of Mobile Ads on 50 News Websites](http://www.nytimes.com/interactive/2015/10/01/business/cost-of-mobile-ads.html) – New York Times; See also the Times’ [Putting Mobile Ad Blockers to the Test](http://www.nytimes.com/2015/10/01/technology/personaltech/ad-blockers-mobile-iphone-browsers.html)

> [How Much of Your Audience is Fake? – Marketers Thought the Web Would Allow Perfectly Targeted Ads But it Hasn’t Worked Out That Way](http://www.bloomberg.com/features/2015-click-fraud/) – BloombergBusiness

> [Facebook Ads Are All-Knowing, Unblockable, and in Everyone’s Phone](http://www.bloomberg.com/news/articles/2015-09-28/facebook-ads-are-all-knowing-unblockable-and-in-everyone-s-phone) – BloombergBusiness

**Analysis and Opinion:**

> [Why It’s OK to Block Ads](http://blog.practicalethics.ox.ac.uk/2015/10/why-its-ok-to-block-ads/) – James Williams at the University of Oxford’s Practical Ethics blog

> [Why Publishers Don’t Care (Yet) that the Mobile Web is so Awful](http://roj.as/blog/the-mobile-web) – Peter Rojas

> [Popping the Publishing Bubble](https://stratechery.com/2015/popping-the-publishing-bubble/) – Ben Thompson at Stratechery

> [Welcome to Hell: Apple vs. Google vs. Facebook and the Slow Death of the Web](http://www.theverge.com/2015/9/17/9338963/welcome-to-hell-apple-vs-google-vs-facebook-and-the-slow-death-of-the-web) – Nily Patel at The Verge

> [Ad Blocking: The Unnecessary Internet Apocalypse – The Ad Industry Needs to Disrupt the Disruptors](http://adage.com/article/digitalnext/ad-blocking-unnecessary-internet-apocalypse/300470/) – Randall Rothenberg, CEO of the Interactive Advertising Bureau, at Advertising Age; But, see IAB’s subsequent mea culpa [Getting LEAN with Digital Ad UX](http://www.iab.com/news/lean/)

> [How We Pass the Buck – Ads, Blocking, and How We Make Sure It’s Never Actually Our Fault](https://medium.com/message/how-we-pass-the-buck-d63fcf409247) – Anil Dash

> [Ad Blocking and the Future of the Web](https://medium.com/@zeldman/ad-blocking-and-the-future-of-the-web-78e44e57edb9) – Jeffrey Zeldman

> [Ad Blocking](http://sethgodin.typepad.com/seths_blog/2015/09/ad-blocking.html) – Seth Godin

> [Advertising is Unwanted](http://scripting.com/2015/09/19/advertisingIsUnwanted.html) – Dave Winer

> [Facebook, Others Confuse Consumers for Profit](http://www.mercurynews.com/opinion/ci_28929705/nate-cardozo-facebook-others-confuse-consumers-profit) – Nate Cardozo of EFF at San Jose Mercury News Opinion

**News You Can Use:**

> [A List of Content Blockers for iOS 9](http://www.loopinsight.com/2015/09/16/a-list-of-content-blockers-for-ios-9/) – The Loop

> [A Study About Content Blockers for iOS 9](https://apple24h.wordpress.com/2015/10/14/ios-9-content-blockers/) – Carlos Oliveira at Oli.78

**Related – The Content Wars: Alternative Distribution and Platforms:**

> [AMP and Incentives](http://timkadlec.com/2015/10/amp-and-incentives/) – Tim Kadlec at his TimKadlec.com

> [Notes from the Platform’s Edge – Platforms for Everyone, Publications For No One](http://www.theawl.com/2015/10/just-one-more-step-back-there-perfect) – The Awl

> [Open Standards Without All That Nasty Interop](http://scripting.com/2015/10/10/supportingStandardsWithoutAllThatNastyInterop.html) – Dave Winer

**Related – General:**

> [Re/code’s Sale and Life After Advertising](http://www.bloombergview.com/articles/2015-05-27/subscriptions-may-work-better-than-advertising-for-digital-news) – Katie Benner at BloombergView

> [Websites Can Now Identify You By the Way You Type – A New Kind of Surveillance that Gets Very Little Attention](http://www.alternet.org/civil-liberties/websites-can-now-identify-you-way-you-type) – AlterNet

10/18/2015: 

Problems with Current Crypto Implementation

**Academic Paper:** “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice” ([pdf](https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf); 13 pages), published earlier this year, but presented at a recent conference

**General Explanation** (by two of the fourteen co-authors of the academic paper): [How is NSA Breaking So Much Crypto?](https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-much-crypto/) – Freedom to Tinker

**EFF’s Two Part Explainer:** [Logjam, Part 1:](https://www.eff.org/deeplinks/2015/05/logjam-internet-breaks-again) “Why the Internet is Broken Again” and [Logjam, Part 2:](https://www.eff.org/deeplinks/2015/05/logjam-part-2-did-nsa-know-years-internet-was-broken) “Did the NSA Know the Internet Was Broken”

**EFF’s Practical Advice:** [How to Protect Yourself from NSA Attacks on 1024-bit DH](https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH)

**Bruce Schneier:** [Breaking Diffie-Hellman with Massive Precomputation (Again)](https://www.schneier.com/blog/archives/2015/10/breaking_diffie.html) and his previous post [The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange](https://www.schneier.com/blog/archives/2015/05/the_logjam_and_.html)

10/15/2015: 

CalECPA Enactment

[**Text**](https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB178) of CalECPA (California Electronic Communications Privacy Act) as signed into law by Governor Brown

**News Story:** [California Requires Warrant To Search Electronic Communications](http://www.natlawreview.com/article/california-requires-warrant-to-search-electronic-communications) – National Law Review

**Reaction to Enactment:**

> [California Now Has the Nation’s Best Digital Privacy Law](http://www.wired.com/2015/10/california-now-nations-best-digital-privacy-law/) – Kim Zetter at Wired

> [California Cops, Want to Use a Stingray? Get a Warrant, Governor Says](http://arstechnica.com/tech-policy/2015/10/california-governor-signs-new-law-mandating-warrant-for-stingray-use/) – ArsTechnica

**Background on CalECPA:** [EFF’s CalECPA information page](https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa)

**Background on ECPA Reform (federal):** [ECPA Reform: A Primer](https://www.justsecurity.org/26120/ecpa-reform-primer/) – Andrew K. Woods in JustSecurity

10/14/2015: 

Quote of the Day – On the TPP:

> “You would think as a free trade loving, free market loving venture capitalist I would be a huge proponent of the [Trans-Pacific Partnership Agreement (TPP)]. But I am not. I am very concerned about the copyright provisions in TPP which feel very much in the old world model of intellectual property protection and which would make it hard for the US government to evolve copyright laws in an era of digital content, more open innovation, and remix culture . . . . I realize that perfect is the enemy of the good and you need to have a comprehensive view of a trade bill like this and not focus on one issue. But copyright law is a big deal for the innovation economy and if I were in Congress, I would be seriously thinking about voting no on TPP.”

> — Fred Wilson (Union Square Ventures) at [AVC](http://avc.com/2015/10/tpp/)

> **TPP** [**Final Text**](https://ustr.gov/trade-agreements/free-trade-agreements/trans-pacific-partnership/tpp-full-text)

> **More on the TPP:**

> News Story: [Trans-Pacific Partnership Is Reached, but Faces Scrutiny in Congress](http://www.nytimes.com/2015/10/06/business/trans-pacific-partnership-trade-deal-is-reached.html?_r=0) – New York Times

> From the EFF: [The Final Leaked TPP Text Is All That We Feared](https://www.eff.org/deeplinks/2015/10/final-leaked-tpp-text-all-we-feared) and [EFF TPP explainer](https://www.eff.org/issues/tpp)

> **Analysis and Criticism:**

> [The Trans-Pacific Free-Trade Charade](https://www.project-syndicate.org/commentary/trans-pacific-partnership-charade-by-joseph-e–stiglitz-and-adam-s–hersh-2015-10) – Joseph Stieglitz and Adam Hersh

> [Here’s the Leaked Trans-Pacific Partnership Document that has Some High-powered Advocates Worried](http://www.businessinsider.com/a-worrisome-leaked-chapter-from-the-trans-pacific-partnership-2015-10) – Business Insider

> Video from the Cato Institute – [TPP in Perspective: 150 Years of U.S. Trade Policy in Less than 4 Minutes](http://www.cato.org/multimedia/cato-video/tpp-perspective-150-years-us-trade-policy-less-4-minutes)

**Previously:** [Impact of Trade Pacts on IP and the Internet (link roundup)](https://www.jrmchale.org/2015/07/impact-of-trade-pacts-on-ip-and-the-internet-link-roundup/)

10/13/2015: 

Recommended:

> #### Law, Tech and Policy

> Summary of the “Happy Birthday” decision: [Chain of Title Proves Fatal to “Happy Birthday” Copyright Claim](http://blog.ericgoldman.org/archives/2015/10/chain-of-title-proves-fatal-to-happy-birthday-copyright-claim-guest-blog-post.htm) – Tyler Ochoa at The Technology & Marketing Law Blog; See also, the court’s decision ([pdf](http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=2056&context=historical))

> Another notable copyright decision: [Appeals Court Strikes a Blow for Fair Use in Long-awaited Copyright Ruling](http://arstechnica.com/tech-policy/2015/09/eff-scores-a-win-in-long-running-dancing-baby-copyright-case/) – ArsTechnica; See also: [9th Circuit Sides With Fair Use in Dancing Baby Takedown Case](http://blog.ericgoldman.org/archives/2015/09/9th-circuit-sides-with-fair-use-in-dancing-baby-takedown-case.htm) – The Technology & Marketing Law Blog; and the court’s opinion ([pdf](https://www.eff.org/document/9th-circuit-opinion-lenz))

> Microsoft Email Case ([wikipedia](https://en.wikipedia.org/wiki/Microsoft_Corporation_v._United_States_of_America)): [The $98.6 Billion E-Mail – Microsoft is Fighting a Case in Federal Appeals Court that may Decide the Future of U.S. Cloud Computing](http://www.bloomberg.com/news/articles/2015-10-08/the-98-6-billion-e-mail) – Bloomberg BusinessWeek

> Administrative Subpoenas: [Here’s a Way the Government Can Easily Get Your Phone Records Without Even Asking a Judge](https://www.washingtonpost.com/blogs/federal-eye/wp/2015/10/05/heres-a-way-the-government-can-easily-get-your-phone-records-without-even-asking-a-judge-and-few-people-know-about-it/) – Washington Post

> The Fifth Amendment and Passcodes: [Fifth Amendment Protects Passcode on Smartphones, Court Holds](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/09/24/fifth-amendment-protects-passcode-on-smartphones-court-holds/) and [A Revised Approach to the Fifth Amendment and Obtaining Passcodes](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/09/25/a-revised-approach-to-the-fifth-amendment-and-obtaining-passcodes/) – Orin Kerr at the Washington Post

> OPM Hack Update: [OPM Says 5.6 million Fingerprints Stolen in Cyberattack, Five Times as Many as Previously Thought](https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/) – Washington Post

> On the Internet of Things: [Why The Internet of Things Is Going Nowhere
The Next Phase of the IoT is Stuck Unless We Replace Crummy Outdated Technology](https://medium.com/@patburns/why-the-internet-of-things-is-going-nowhere-112540e79ae) – Pat Burns. See also, [The Price of the Internet of Things will be a Vague Dread of a Malicious World](http://ieet.org/index.php/IEET/more/rinesi20150925) – Marcelo Renesi, and [Internet of Things That Lie: the Future of Regulation is Demonology](http://boingboing.net/2015/10/02/internet-of-things-that-lie-t.html) – Cory Doctorow

> Moore’s Law: [Smaller, Faster, Cheaper, Over: The Future of Computer Chips](http://www.nytimes.com/2015/09/27/technology/smaller-faster-cheaper-over-the-future-of-computer-chips.html) – New York Times; Also at the New York Times: [IBM Scientists Find New Way to Shrink Transistors](http://www.nytimes.com/2015/10/02/science/ibm-scientists-find-new-way-to-shrink-transistors.html?ref=technology&_r=0)

> Apple: [On Apple’s Incredible Platform Advantage](http://stevecheney.com/on-apples-incredible-platform-advantage/) – Steve Cheney on Apple’s computer chip advantage

> #### General Interest

> [Scouring the Web to Make New Words ‘Lookupable’](http://www.nytimes.com/2015/10/04/technology/scouring-the-web-to-make-new-words-lookupable.html) – New York Times

> Angus Deaton Wins the Nobel Prize in Economics:

>> The Nobel Committee’s explainers (pdf): for [general readers](http://www.nobelprize.org/nobel_prizes/economic-sciences/laureates/2015/popular-economicsciences2015.pdf) and for [technical readers](http://www.nobelprize.org/nobel_prizes/economic-sciences/laureates/2015/advanced-economicsciences2015.pdf)

>> [Angus Deaton: A Skeptical Optimist Wins the Economics Nobel](http://www.newyorker.com/news/john-cassidy/angus-deaton-a-skeptical-optimist-wins-the-economics-nobel) – New Yorker

>> [Five Minutes with Angus Deaton: ‘If the rich can write the rules then we have a real problem’](http://blogs.lse.ac.uk/europpblog/2013/12/07/five-minutes-with-angus-deaton-if-the-rich-can-write-the-rules-then-we-have-a-real-problem/) – London School of Economics

>> [A Cockeyed Optimist – Angus Deaton’s ‘Great Escape’](http://www.nytimes.com/2013/12/22/books/review/angus-deatons-great-escape.html?nytmobile=0&_r=0) – New York Times

> Svetlana Alexievich Wins the Nobel Prize in Literature:

>> [Everything You Need to Know About Svetlana Alexievich](http://www.theguardian.com/books/booksblog/2015/oct/08/everything-you-need-to-know-about-svetlana-alexievich-winner-of-the-nobel-prize-in-literature) – The Guardian

>> [Svetlana Alexievich’s Chorus of Fire](http://www.nytimes.com/2015/10/09/magazine/svetlana-alexievichs-chorus-of-fire.html?_r=0) – New York Times

>> [Voices from Chernobyl](http://www.theparisreview.org/letters-essays/5447/voices-from-chernobyl-svetlana-alexievich)(book excerpt) – Paris Review

> Meanwhile: [2010 Peace Laureate Languishes in Chinese Jail in Face of International Indifference](http://en.rsf.org/china-2010-peace-laureate-languishes-in-12-10-2015,48430.html) – Reporters without Borders

> On David Carr: [Press Rewind – What One Journalist Learned by Vicariously Sitting in on David Carr’s Master Class](http://www.themorningnews.org/article/press-rewind) – Brendan Fitzgerald at The Morning News; See also, previously: [We Need a David Carr Portable Companion; Here’s the first Draft](https://medium.com/backchannel/we-need-a-david-carr-portable-companion-89f54fda0b33) – Karen Wickre at BackChannel/Medium

10/13/2015: 

Leaked NSC Memo on Encryption – Is It All Just Kabuki?

**Background:** The leaked [NSC Draft Options Paper](http://apps.washingtonpost.com/g/documents/national/read-the-nsc-draft-options-paper-on-strategic-approaches-to-encryption/1742/) – at The Washington Post

**News Story:** [Obama Faces Growing Momentum to Support Widespread Encryption](https://www.washingtonpost.com/world/national-security/tech-trade-agencies-push-to-disavow-law-requiring-decryption-of-phones/2015/09/16/1fca5f72-5adf-11e5-b38e-06883aacba64_story.html?postshare=691442489453096) – The Washington Post

**Skepticism:** [Obama Edges Toward Full Support for Encryption – But Does He Understand What that Means?](http://www.theregister.co.uk/2015/09/16/obama_edging_toward_support_for_encryption?mt=1442491356410) – Kieren McCarthy at The Register:
> “By voluntary cooperation [in the absence of compulsion], what is the White House saying? That the encryption is secure and backdoor-free until a company cooperates with the Feds, at which point the encryption is somehow dialed back, and messages and files can be suddenly magically read? That sounds like a backdoor. Does the White House want, say, Apple to volunteer, at the sight of a warrant, to intercept key exchanges in the cloud so that intercepted iMessages can be decrypted? Won’t that undermine the whole practice of end-to-end encryption by introducing backdoors by another name? Either encryption is secure and backdoor-free, or it isn’t and is generally useless. We assume by ‘voluntary cooperation,’ the President is willing to be told to get lost by the tech giants in November – if they have the strength to do so. If not, then all of this is a sham; a political maneuver to keep privacy-loving nerds quiet. It is very possible that the decision has already been made and outreach is about to begin, leading to the leak of the NSC memo.”

09/17/2015: 

The Revived Encryption Wars Continue (updated)

**The Latest (09.15.2015):**

> [The FBI’s Problem Isn’t ‘Going Dark’ – Its Problem is Going Slowly](https://www.justsecurity.org/24695/fbis-problem-going-dark-slow/) – Marshall Erwin at JustSecurity

> [Of Course the Government Wants to Read Your Texts](http://www.bloombergview.com/articles/2015-09-08/of-course-the-government-wants-to-read-your-texts) – Megan McArdle at BloombergView

> [Why the Fear over Ubiquitous Data Encryption is Overblown](https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-encryption/2015/07/28/3d145952-324e-11e5-8353-1215475949f4_story.html) – Mike McConnell, Michael Chertoff and William Lynn op-ed in The Washington Post

**Some Additional Background:**

> [A History of Backdoors](http://blog.cryptographyengineering.com/2015/07/a-history-of-backdoors.html) – Matthew Green at his A Few Thoughts on Cryptographic Engineering

> [Deep Dive into Crypto “Exceptional Access” Mandates: Effective or Constitutional—Pick One](https://www.eff.org/deeplinks/2015/08/deep-dive-crypto-exceptional-access-mandates-effective-or-constitutional-pick-one) – EFF

**Can the FBI and IC already Access Apple’s iMessages (and Tor Users)?**

> [iPhones, the FBI, and Going Dark](https://www.lawfareblog.com/iphones-fbi-and-going-dark) – Nicholas Weaver guest post at LawFare

> [Let’s Talk about iMessage (again)](http://blog.cryptographyengineering.com/2015/09/lets-talk-about-imessage-again.html) – Matthew Green at his A Few Thoughts on Cryptographic Engineering; Also from Matthew Green: [Can Apple read your iMessages?](http://blog.cryptographyengineering.com/2013/06/can-apple-read-your-imessages.html)

> [FBI Director Claims Tor and the ‘Dark Web’ Won’t Let Criminals Hide From His Agents](https://theintercept.com/2015/09/10/comey-asserts-tors-dark-web-longer-dark-fbi/) – The Intercept’s Unofficial Sources

> [](https://twitter.com/20committee/status/611272144136220673)   “We can ‘win’ the crypto wars in public, and still lose behind closed doors. If Apple & WhatsApp quietly backdoor their crypto the FBI wins” – Christopher Soghoian [(@csoghoian)](https://twitter.com/csoghoian): July 10, 2015

> Related:

> [FBI and Apple’s Encryption](https://www.schneier.com/blog/archives/2015/09/fbi_and_apples_.html) – Bruce Schneier

> [Apple and Other Tech Companies Tangle With U.S. Over Data Access](http://www.nytimes.com/2015/09/08/us/politics/apple-and-other-tech-companies-tangle-with-us-over-access-to-data.html?nytmobile=0&_r=5) – New York Times

**Background – 2014-15, the Crypto Wars Return**

> [Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications](http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6) (pdf; 34 pages) – MIT Computer Science and Artificial Intelligence Laboratory Technical Report (July 6, 2015)

> [Code Specialists Oppose U.S. and British Government Access to Encrypted Communication](http://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted-communication.html?nytmobile=0&_r=5) – New York Times on the July 6th MIT report

> [Encryption, Public Safety, and ‘Going Dark’](http://www.lawfareblog.com/encryption-public-safety-and-going-dark) – FBI Director James Comey writing at LawFare in advance of several Congressional hearings July 8th on encryption and related issues.

> [Let’s Get Real About Decryption, Says GCHQ Tech Director](http://www.computerweekly.com/news/4500249317/Lets-get-real-about-decryption-says-GCHQ-tech-director) – ComputerWeekly

> [It’s Time to End the ‘Debate’ on Encryption Backdoors](http://justsecurity.org/24483/end-debate-encryption-backdoors/) – Kevin Bankstown at JustSecurity arguing that it is time for FBI head James Comey to admit that he has lost the battle over encryption backdoors

> [Encryption, Biometrics, and the Status Quo Ante](http://www.lawfareblog.com/encryption-biometrics-and-status-quo-ante) – Paul Rosenzweig at LawFare proposing mandatory biometric encryption, a novel, but problematic proposal in the encryption debate

> [The Battle Between Washington and Silicon Valley Over Encryption](http://passcode.csmonitor.com/cryptowars) – CSM’s Passcode

> [James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked](http://www.nytimes.com/2014/10/17/us/politics/fbi-director-in-policy-speech-calls-dark-devices-hindrance-to-crime-solving.html) – The New York Times, and [FBI director Attacks Tech Companies for Embracing New Modes of Encryption; James Comey says Data Encryption Could Deprive Police and Intelligence Agencies of Potentially Live-saving Information](http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-companies-encryption) – The Guardian

> [How Do We Build Encryption Backdoors?](http://blog.cryptographyengineering.com/2015/04/how-do-we-build-encryption-backdors.html) – Professor Matthew Green (Johns Hopkins) analyzes the problems with building encryption backdoors, including split key approaches, at his [A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/) blog

> [You Can’t Backdoor a Platform](http://webpolicy.org/2015/04/28/you-cant-backdoor-a-platform/) – Jonathan Mayer at his Web Policy blog

> [As Encryption Spreads, U.S. Grapple with Clash between Privacy, Security](http://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html?wprss=rss_national-security) – Ellen Nakashima and Barton Gellman writing in The Washington Post reveal that federal officials are considering a variety of means of ensuring access to encrypted communications, including split key approaches, as well as, in certain circumstances, mirror accounts. Under the split key approach (difficult from an engineering and cryptography standpoint), a technology company creates a decryption key that is split into pieces, with different pieces held by different parties, and all of the pieces are needed for decryption. But even aside from the question of trust in the holders of the key parts, risk of disclosure of the decrypted information and the like, as security expert/researcher, Dino A. Dai Zovi (@dinodaizovi) tweeted: “The big question of the #cryptodebate isn’t whether vendors can make a decryption key for USG, but what happens when other [governments] want it too?”

> [Apple Will No Longer Unlock Most iPhones, iPads for Police, even with Search Warrants](http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html) – The Washington Post

> [iPhone Encryption and the Return of the Crypto Wars](https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html) – Bruce Schneier

> [What NSA Director Mike Rogers Doesn’t Get About Encryption](http://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryption) – Julian Sanchez at CATO

> [What President Obama is getting wrong about encryption](http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/19/what-president-obama-is-getting-wrong-about-encryption/) – The Washington Post

> [The FBI Keeps Demanding Impossible Solutions to Its Encryption Problem](http://motherboard.vice.com/read/the-fbi-keeps-demanding-impossible-solutions-to-its-encryption-problem) – MotherBoard/Vice

**Background – the 1990’s (and earlier) Crypto Wars**

> [Keeping Secrets: Four Decades Ago, University Researchers Figured out the Key to Computer Privacy, Sparking a Battle with the National Security Agency that Continues Today.](https://medium.com/stanford-select/keeping-secrets-84a7697bf89f) – Henry Corrigan-Gibbs (Stanford Magazine)

> [Encryption and Globalization](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1960602) – a 2011 academic paper (Columbia Science and Technology Law Review, Vol. 23, 2012) by Peter Swire and Kenesa Ahmad, which includes a brief summary of the original 90’s “Crypto Wars”

> [Crypto Wars](http://en.wikipedia.org/wiki/Crypto_Wars) – Wikipedia

> [Hacker Lexicon: What is End-to-End Encryption](http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption/) – Wired

**Related**

> [Want to Protect your Phone from the Cops? You Might Want to Use a Passcode, Not a Fingerprint; Virginia Court Rules Using Fingerprint Technology to Protect Your Phone Doesn’t Carry Same Legal Rights as Passcodes](http://www.fastcompany.com/3037912/want-to-protect-your-phone-from-the-cops-you-might-want-to-use-a-passcode-not-a-fingerprint) – FastCompany

09/15/2015: 

Some Recent Academic Papers of Interest

[Constitutional Malware](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2633247) – Jonathan Mayer

[Surveillance Duration Doesn’t Affect Privacy Expectations: An Empirical Test of the Mosaic Theory](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2629373) – Lior Strahilevitz and Matthew B. Kugler

[Can Americans Resist Surveillance?](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2635181) – Ryan Calo

[Investigating the Computer Security Practices and Needs of Journalists](http://www.franziroesner.com/pdf/journalism-sec15.pdf) – Susan McGregor, Franziska Roesner, Polina Charters and Tobin Holliday

[Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services](http://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf) – Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas

09/15/2015: 

Four New Resources

EFF has created a new tool, [Democracy.io](https://democracy.io/#/), to facilitate sending messages to members of the US Senate and House of Representatives. EFF Announcement: [Launching Democracy.io as a Step Toward a Better Democracy](https://www.eff.org/deeplinks/2015/07/launching-democracyio-step-toward-better-democracy)

Version 5.0 of Professor [James Grimmelmann](http://james.grimmelmann.net)’s (University of Maryland) [Internet Law: Cases and Problems](http://internetcasebook.com) has been released (pdf casebook; $30 suggested price).

2015 edition of Professor Eric Goldman’s (Santa Clara University School of Law; High Tech Law Institute) [Internet Law Cases and Materials](http://blog.ericgoldman.org/archives/2015/07/2015-internet-law-casebook-now-available.htm) has also been released (pdf – $8, hard copy – $20 plus shipping/tax, and kindle – $9.99 editions).

Politico has a [Morning CyberSecurity Tipsheet](http://www.politico.com/tipsheets/morning-cybersecurity). Sign up at the link.

All four have been added to my updated list of [Internet Law and Policy Resources](https://www.jrmchale.org/cyberlaw-resources/).

09/14/2015: 

Quote of the Day

> “For as long as the idea of the ‘mobile internet’ has been around, we’ve thought of it as a cut-down subset of the ‘real’ Internet. I’d suggest it’s time to invert that – to think about mobile as the real internet and the desktop as the limited, cut-down version.”

Benedict Evans, from his post: “[Forget About the Mobile Internet](http://ben-evans.com/benedictevans/2015/9/1/forget-about-mobile-internet)”. Read the whole thing.

09/14/2015: 

Recommended:

> #### Law, Tech and Policy

> [Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You](http://www.wired.com/2015/08/hard-sue-nsa-prove-spied/) – Wired

> [Tech Companies May be our Best Hope for Resisting Government Surveillance](http://fusion.net/story/193583/tech-companies-may-be-our-best-hope-for-resisting-government-surveillance/) – Ryan Calo at Fusion; and his related academic paper: [Can Americans Resist Surveillance?](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2635181)

> [A New Design (Indistinguishability Obfuscation or IO) for Cryptography’s Black Box](https://www.quantamagazine.org/20150902-indistinguishability-obfuscation-cryptographys-black-box/) – Quanta

> [Don’t Worry, Smart Machines Will Take Us With Them; Why Human Intelligence and AI will Co-Evolve](http://nautil.us/issue/28/2050/dont-worry-smart-machines-will-take-us-with-them?utm_source=RSS_Feed&utm_medium=RSS&utm_campaign=RSS_Syndication) – Stephen Hsu at Nautilus

> [Why Are There Any Jobs Still Left? Technology Eliminates Jobs, Not Work](https://reason.com/blog/2015/08/28/why-are-there-any-jobs-still-left) – Reason

> [Securing Today’s Data Against Tomorrow’s Quantum Computers](http://www.technologyreview.com/news/539441/securing-todays-data-against-tomorrows-quantum-computers/) – MIT Technology Review; Related: [NSA Plans for a Post-Quantum World](https://www.schneier.com/blog/archives/2015/08/nsa_plans_for_a.html) – Schneier on Security

> [A Bit of Internet History, or How Two Members of Congress Helped Create a Trillion or So Dollars of Value](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/08/27/a-bit-of-internet-history-or-how-two-members-of-congress-helped-create-a-trillion-or-so-dollars-of-value/) – David Post in The Washington Post

> [The Web We Have to Save: The Rich, Diverse, Free Web that I Loved — and Spent Years in an Iranian Jail For — is Dying; Why is Nobody Stopping It?](https://medium.com/matter/the-web-we-have-to-save-2eb1fe15a426) – Medium

> [What Ever Happened to Google Books?](http://www.newyorker.com/business/currency/what-ever-happened-to-google-books) – Tim Wu at The New Yorker

> [DIY Tractor Repair Runs Afoul Of Copyright Law](http://www.npr.org/sections/alltechconsidered/2015/08/17/432601480/diy-tractor-repair-runs-afoul-of-copyright-law) – NPR

> #### General Interest

> [We Need a David Carr Portable Companion; Here’s the first Draft](https://medium.com/backchannel/we-need-a-david-carr-portable-companion-89f54fda0b33) – Karen Wickre at BackChannel/Medium

> [Harvard Linguist Points out the 58 Most Commonly Misused Words and Phrases](http://www.metrowestdailynews.com/article/ZZ/20150908/BUSINESS/309089909/?Start=1) – MetroWest Daily News on [Steven Pinker](http://stevenpinker.com/publications/sense-style-thinking-persons-guide-writing-21st-century)’s book, [The Sense of Style](http://www.amazon.com/gp/product/0670025852/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=0670025852&linkCode=as2&tag=thebusiinsi-20&linkId=XTLTCO2LLUJIO43B)

> How to Fix Twitter: [Twitter’s 140-character Limit Doesn’t Get You Better Writing](http://scripting.com/2015/09/10/the140charLimitDoesntGetYouBetterWriting.html) – Dave Winer; [Why Twitter Must Blow Past 140](http://scripting.com/2015/09/03/whyTwitterMustBlowBy140.html) – Dave Winer; [Should Twitter Lose the 140-character Limit or Would that be Suicide?](http://fortune.com/2015/09/03/twitter-140-characters/) – Mathew Ingram at Fortune; [The Network’s the Thing](http://www.eugenewei.com/blog/2015/9/1/when-the-network-is-mature) – Eugene Wei

> [Richard Stallman: How I Do My Computing](https://stallman.org/stallman-computing.html) – Stallman.org

> Two from BuzzFeed: [Scientists Are Hoarding Data And It’s Ruining Medical Research](http://www.buzzfeed.com/bengoldacre/deworming-trials) – Ben Goldacre; [Here’s What Actually Gets Terrorists To Tell The Truth — And It’s Not Torture](http://www.buzzfeed.com/peteraldhous/torture-doesnt-work) – Peter Aldhous

09/14/2015: 

The OPM Hack (link roundup – updated)

**Update 08.31.2015:**

> [China and Russia are Using Hacked Data to Target U.S. Spies, Officials Say](http://www.latimes.com/nation/la-na-cyber-spy-20150831-story.html)- Los Angeles Times

**How Bad? Very Bad:**

> [Newly Disclosed Hack Got ‘Crown Jewels’; ‘This is Not the End of American Human Intelligence, but it’s a Significant Blow,’ a Former NSA Official Says](http://www.politico.com/story/2015/06/hackers-federal-employees-security-background-checks-118954.html)- Politico

> [Hackers May Have Obtained Names of Chinese With Ties to U.S. Government](http://www.nytimes.com/2015/06/11/world/asia/hackers-may-have-obtained-names-of-chinese-with-ties-to-us-government.html?_r=0) – New York Times

> [The Hack on the U.S. Government was Not a ‘cyber Pearl Harbor’ (But it was a Very Big Deal)](http://www.washingtonpost.com/blogs/monkey-cage/wp/2015/06/15/the-hack-on-the-u-s-government-was-not-a-cyber-pearl-harbor-but-it-was-a-very-big-deal/) – Washington Post

> [Officials: Chinese Had Access to U.S. Security Clearance Data for One Year](http://www.washingtonpost.com/blogs/federal-eye/wp/2015/06/18/officials-chinese-had-access-to-u-s-security-clearance-data-for-one-year/?postshare=8401434679772773) – Washington Post

> [Attack Gave Chinese Hackers Privileged Access to U.S. Systems](http://www.nytimes.com/2015/06/21/us/attack-gave-chinese-hackers-privileged-access-to-us-systems.html?_r=5) – New York Times

> [China’s Hackers Got What They Came For](http://thehill.com/policy/cybersecurity/245614-chinas-hackers-got-what-they-came-for) – The Hill

> [Hacking as Offensive Counterintelligence](http://20committee.com/2015/06/08/hacking-as-offensive-counterintelligence/);   [China’s Hack Just Wrecked American Espionage](http://www.thedailybeast.com/articles/2015/06/15/china-s-hack-just-wrecked-american-espionage.html) and [China’s Spies Hit the Blackmail Jackpot With Data on 4 Million Federal Workers](http://www.thedailybeast.com/articles/2015/06/11/china-s-spies-hit-the-blackmail-jackpot-with-every-data-on-federal-worker.html) – John Schindler at his XXCommittee blog and at The Daily Beast

**How Was It Discovered? During a Product Demo:**

> [Report: Hack of Government Employee Records Discovered by Product Demo
Security Tools Vendor Found Breach, Active over a Year, at OPM During Sales Pitch](http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/) – ArsTechnica

**Level of OPM Incompetency? High. Very Old Software, Unencrypted Databases, and Foreign Contractors, Including Chinese, with Root Access:**

> [Encryption “would not have helped” at OPM, Says DHS Official; Attackers had Valid User Credentials and Run of Network, Bypassing Security](http://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/) – ArsTechnica, with details of the OPM systems and lack of security

> [](https://twitter.com/20committee/status/611272144136220673)   “!! OPM IT outsourced to foreigner contractors, with root access, working from their home country. In this case, China” – John Schindler [(@20committee)](https://twitter.com/20committee): June 17, 2015

> [Oversight Chairman: Fire Leaders of Hacked Agency](http://www.politico.com/story/2015/06/katherine-archuleta-opm-computer-hack-house-119067.html) – Politico

**Related:**

> [5 Chinese Cyber Attacks That Might Be Even Worse Than the OPM Hack](http://www.defenseone.com/threats/2015/06/5-chinese-cyber-attacks-might-be-even-worse-opm-hack/115321/) – Defense One

**Quotes:**

> Former NSA and CIA Director, Michael Hayden (quote via Benjamin Wittes @ [Lawfare.com](http://www.lawfareblog.com/michael-hayden-those-records-are-legitimate-foreign-intelligence-target)) as to what he would have done if he had had the ability to get Chinese records equivalent to the OPM records when he was serving in his IC positions:

>> “I would not have thought twice. I would not have asked permission. I’d have launched the star fleet. And we’d have brought those suckers home at the speed of light . . . This is shame on us for not protecting that kind of information.”

> From Benjamin Wittes writing on the OPM hack at LawFare in his post “[Is the Privacy Community Focused on the Wrong Government?](http://www.lawfareblog.com/privacy-community-focused-wrong-government)”:

>> “For the record, I have no problem with the Chinese going after this kind of data. Espionage is a rough business and the Chinese owe as little to the privacy rights of our citizens as our intelligence services do to the employees of the Chinese government. It’s our government’s job to protect this material, knowing it could be used to compromise, threaten, or injure its people—not the job of the People’s Liberation Army to forebear collection of material that may have real utility. Yet I would have thought that privacy groups that take such strong views of the need to put limits on American collection, even American collection overseas against non-U.S. persons, would look a little askance at a foreign intelligence operation consisting of the bulk collection of the most highly-personal information—an operation involving not only government employees but also those close to them. You’d think this would raise someone’s privacy hackles, if not mine.”

> Adam Elkus writing at [BusinessInsider](http://www.businessinsider.com/the-opm-breachs-cybersecurity-paradox-2015-6#ixzz3dQmSC4FD):

>> “[C]leaning up the systematic dysfunction in OPM and other agencies will require a harsh and swift hand and plenty of pink slips. Fantasizing about super-hackers and visions of cyber-doom are more fun than the boring but necessary drudgery, for example, of modernizing a decrepit and decaying federal information technology base or ensuring that basic security protocols are observed.”

> Megan McArdle at [BloombergView](http://www.bloombergview.com/articles/2015-06-18/it-s-not-just-another-data-breach-it-s-outrageous-):

>> “The serial IT disasters we have seen over the past seven years do not need a blue-ribbon commission or a really stern memo to fix them. If we want these holes fixed before they become catastrophic, we need leaders with a scorched-earth determination to have adequate IT. The only way that determination happens is if these failures become an existential threat to the careers of the politicians in charge.”

08/31/2015: 

Wassenaar Arrangement Implementation (updated)

**The Latest (08.01.2015) – Proposed Rules Pulled for Rewrite:**

> [Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes](http://www.lexology.com/library/detail.aspx?g=b82d52ba-6d8a-4101-9f10-e064762ba9cb) – Lexology

> [Unusual Re-do of US Wassenaar Rules Applauded](https://threatpost.com/unusual-re-do-of-us-wassenaar-rules-applauded/114096/) – Kaspersky Lab Threat Post

> [The US is Rewriting its Controversial Zero-day Export Policy](http://www.theverge.com/2015/7/29/9068665/wassenaar-export-zero-day-revisions-department-of-commerce) – The Verge

**Proposed Implementation:**

> Bureau of Industry and Standards’ [Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items](https://www.federalregister.gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary-agreements-implementation-intrusion-and-surveillance-items) ([pdf](); 49 pages)

> BIS [FAQs](http://www.bis.doc.gov/index.php/policy-guidance/faqs?view=category&id=114#subcat200) on the Intrusion and Surveillance Items Implementation

**Background:**

> [Wassenaar Arrangement](https://en.wikipedia.org/?title=Wassenaar_Arrangement) – Wikipedia

> [The International Rules that Have the Security World on Alert](http://www.theverge.com/2015/5/22/8644185/wassenaar-arrangement-export-zero-day-research) – The Verge

**Analysis and Opinion:**

> [Why an Arms Control Pact has Security Experts Up in Arms](http://www.wired.com/2015/06/arms-control-pact-security-experts-arms/) – Kim Zetter in Wired

> [Proposed U.S. Export Controls: Implications for Zero-Day Vulnerabilities and Exploits](http://www.lawfareblog.com/proposed-us-export-controls-implications-zero-day-vulnerabilities-and-exploits) – Mailyn Fidler at LawFare

> [Changes to Export Control Arrangement Apply to Computer Exploits and More](http://justsecurity.org/5703/export-control-arrangement-apply-computer-exploits/) – Jennifer Granick and Mailyn Fidler at JustSecurity

> [What Is the U.S. Doing About Wassenaar, and Why Do We Need to Fight It?](https://www.eff.org/deeplinks/2015/05/we-must-fight-proposed-us-wassenaar-implementation) – EFF

> Also from the EFF: [Commerce Department FAQ on Proposed Wassenaar Implementation Gives Answers, Raises More Questions](https://www.eff.org/deeplinks/2015/06/commerce-department-faq-proposed-wassenaar-implementation-gives-answers-raises)

> [Why Changes to Wassenaar Make Oppression and Surveillance Easier, Not Harder](http://addxorrol.blogspot.com/2015/05/why-changes-to-wassenaar-make.html) – ADD/XOR/ROL blog

> [Why You Should Fear the New Regulations More Than You Think](https://lists.immunityinc.com/pipermail/dailydave/2015-June/000958.html) – Dave Aitel

**Related:**

> Regulating the Zero-Day Vulnerability Trade: A Preliminary Analysis ([pdf](http://moritzlaw.osu.edu/students/groups/is/files/2015/06/Fidler-Second-Review-Changes-Made.pdf); 78 pages) – academic paper by Mailyn Fidler forthcoming in “I/S: A Journal of Law and Policy for the Information Society”

Question of the Day

Bruce Schneier at his [Schneier on Security](https://www.schneier.com/blog/archives/2015/07/office_of_perso.html) on the OPM Hack:

> “My question is this: Has anyone thought about the possibility of the attackers manipulating data in the [OPM] database? What are the potential attacks that could stem from adding, deleting, and changing data?”

Related: It just keeps getting worse. [The Massive OPM Hack Actually Hit 25 Million People](http://www.wired.com/2015/07/massive-opm-hack-actually-affected-25-million/) – Kim Zetter at Wired

07/9/2015: