The Cyberlaw Podcast show

The Cyberlaw Podcast

Summary: A weekly podcast offering an opinionated roundup of the latest events in technology, security, privacy, and government and an in-depth interview of technology and policy newsmakers. Host Stewart Baker and regulars share their views  - and not those of the firm.

Podcasts:

 Interview with Thomas Rid and Jeffrey Carr | File Type: audio/mpeg | Duration: 57:28

In our fifty-first episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Jason Weinstein, and Ed Krauland discuss: more details emerging on the secret DEA phone log database; in the wake of the attacks the EU wants to force internet and phone companies to turn over encryption keys and asks tech firms to remove more EU content; cellphone companies avoid some wiretap claims in multidistrict litigation case involving Carrier IQ; another setback for LabMD in its challenge to the FTC; the US eases restrictions on telecom, Internet, and related financial services for Cuba; and shocking poll shows that the NSA is holding its own in public confidence. In our second half we have an interview with Thomas Rid, Professor of Security Studies at King’s College London and author of ‘Cyber War Will Not Take Place,’ and Jeffrey Carr, CEO of Taia Global. They debate cyberattack attribution. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

 Interview with David Sanger | File Type: audio/mpeg | Duration: 1:05:28

In our fiftieth episode of the Steptoe Cyberlaw Podcast, Stewart Baker and Michael Vatis discuss President Obama’s proposed cybersecurity legislation in State of the Union address; Europe’s expanded surveillance in wake of Charlie Hebdo killings; the National Academy of Sciences study group finds no easy substitute for bulk data collection; the DEA’s bulk metadata program is disclosed; pro-ISIS group compromises Central Command’s Twitter and Youtube accounts; and Prime Minister Cameron lobbies President Obama on encryption. In our second half we have an interview with David Sanger, the chief Washington correspondent for The New York Times and author of ‘Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power.’ He discusses his latest story on how North Korea developed its cyberattack network, and how the National Security Agency managed to compromise the network sufficiently to attribute the Sony attack. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

 Interview with Juan Zarate | File Type: audio/mpeg | Duration: 54:22

In our forty-ninth episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Jason Weinstein, and Meredith Rathbone are joined by Juan Zarate, a senior adviser at the Center for Strategic and International Studies (CSIS), in a discussion of new credit cards may fall short on fraud control; FBI says warrants are not needed for stingrays; EU data supervisor presses for privacy overhaul in 2015; Lyft and Uber answer Senator Franken on privacy; NY District Attorney criticizes Apple, Google for phone encryption plans; German government sites shut down by cyberattack; Sony hackers ‘Got Sloppy’ says FBI director; FBI asks for information sharing; FCC will continue punishing data security violations; Russia extends deadline for data localization; and French terror attacks will affect surveillance in both Europe and the US. In our second half, Juan Zarate offers his insights on US sanctions on North Korea following the Sony attack. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

 Interview with Jim Lewis | File Type: audio/mpeg | Duration: 57:33

In our forty-eighth episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Jason Weinstein, and Stephanie Roy are joined by Jim Lewis, a senior fellow and director of the Strategic Technologies Program at CSIS, in a discussion of: will fingerprint phone locks protect you from the police?; Google faces $18m fine from Dutch privacy watchdog; over 80% of dark net traffic goes to child abuse sites; German iron plant suffers severe damage due to cyberattack; NSA forced to disclose oversight reports of past violations; the FCC and FTC are increasingly policing the same beat, such as text message “cramming” and privacy and security failures; FBI investigates banks for revenge hacking of Iran; and an update on the Sony hack. In our second half, Jim Lewis offers his insights on China’s approach to cyber conflict. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Comments

Login or signup comment.