
Susan Landau
Articles
-
Nov 21, 2024 |
lawfaremedia.org | Daniel Byman |Susan Landau
For the past 50 years, governments have carried out a campaign against end-to-end encryption (E2EE), a technology that secures communications so that only the message endpoints (the sender and receiver of the message) can see the unencrypted communication. From the 1970s to the late 1990s, the fight against widespread use of E2EE was carried out largely by the National Security Agency (NSA), with the FBI joining the battle in the early 1990s.
-
Nov 13, 2024 |
lawfaremedia.org | Daniel Byman |Susan Landau
One never wants to be in an “I-told-you-so” position when a national security crisis comes to pass. And yet that is exactly where my cybersecurity colleagues and I now find ourselves. In October, the Wall Street Journal reported:A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
-
Jun 21, 2024 |
lawfaremedia.org | Jim Dempsey |Susan Landau
Published by The Lawfare Institute in Cooperation With In October 2023, President Biden issued an executive order on the safe and responsible development and use of artificial intelligence (AI).
-
Mar 11, 2024 |
lawfaremedia.org | Jim Dempsey |Susan Landau
In an October 2023 executive order, President Biden drew a highly detailed but largely aspirational road map for the safe and responsible development and use of artificial intelligence (AI). The executive order’s premise that AI “holds extraordinary potential for both promise and peril” is perhaps nowhere more clearly manifested than in efforts currently well underway to adopt AI and other advanced technologies in the administration of government programs.
-
Dec 20, 2023 |
lawfaremedia.org | Susan Landau
Published by The Lawfare Institute in Cooperation With Internet-enabled child sexual abuse exploitation (CSAE) is a horrible crime—and there’s no doubt that some CSAE investigations are stymied because criminals hide evidence using end-to-end encryption (E2EE), a method of securing communications so that only the message endpoints can view the unencrypted message.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →