Blog

Thinking About State and Local Government Cyber Security Exercises: Insights from INCIBE in Spain

Serious cyber attacks and incidents – the kind that have serious long-term consequences - are, thankfully, relatively rare in most state and local governments.  That said, they’re not nearly as uncommon as would be ideal and, perhaps more problematically, they seem to be becoming more common.  So how do these jurisdictions prepare for such events?  Planning, preparedness, and “cyber hygiene” efforts are all valuable, but an important part of the toolkit for learning how to do those tasks more effectively, and for testing existing practices, is through the use of exercises and simulations.  Read more » about Thinking About State and Local Government Cyber Security Exercises: Insights from INCIBE in Spain

Regarding the Politics of Surveillance Reform

Since 9/11 the spectre of 'terrorism' and the ethos of what I term 'Everwar' and the permanent state of national emergency have permeated the Congressional and national political agendas. Over the years, starting with the USA 'PATRIOT' Act rushed to passage in October 2001, a variety of legal, procedural and technical tools, processes, and interpretations  -- some quite controversial -- were enacted or accepted in order to "protect the homeland" from the allegedly existential threat of terrorism.   Read more » about Regarding the Politics of Surveillance Reform

Is your design inspired or stolen?

"Am I a crook?" A design client recently asked me this question about one its designs, and whether is was legally inspired by or stolen from other works. Of course, Jonathan Adler may consider my client a crook when it uses an edited, transformed, and artistically styled sample of his pillow design to create a custom-made wallpaper design for sale to the public. But would he be right? These days, it is getting harder to tell, but there are still guidelines that can help you navigate the sometimes murky waters separating inspiration from infringement.   Read more » about Is your design inspired or stolen?

"Tool Without a Handle: 21st Century Privacy – A Quantum Puzzle

Recent reflection has prompted me to ask if quantum mechanics might help illuminate a path towards better dialogue about the Internet and data privacy in particular. Are network technologies tools? Or landscapes? Is the Internet a tool you use or a place you go? Perhaps the networked technologies exhibit properties of both, depending on the beliefs and perspective of the observer.

I consider this question in the instance of defining "personal data," and conclude personal data exhibits quantum properties in the following ways:
1) It can be in more than two places at once, or at least appear to be. The same data element can be both “private” (treated as confidential) and “public” at the same time.
2) The trajectory of data is not always subject to the same mechanical laws of physics that allow for relatively simple predictions of motion;
3) Data are “entangled”: one data element can be influenced by another unrelated and seemingly disconnected data element, even at a distance Read more » about "Tool Without a Handle: 21st Century Privacy – A Quantum Puzzle

Pages

Subscribe to Stanford CIS Blog