『The Cyberlaw Podcast』のカバーアート

The Cyberlaw Podcast

The Cyberlaw Podcast

著者: Stewart Baker
無料で聴く

このコンテンツについて

The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own. 政治・政府
エピソード
  • The Digital Fourth Amendment with Orin Kerr
    2025/05/30

    The Cyberlaw Podcast is back from hiatus – briefly! I’ve used the hiatus well, skiing the Canadian Ski Marathon, trekking through Patagonia, and having a heart valve repaired (all good now!). So when I saw (and disagreed with ) Orin Kerr’s new book, I figured it was time for episode 502 of the Cyberlaw Podcast. Orin and I spend the episode digging into his book, The Digital Fourth Amendment: Privacy and Policing in Our Online World.

    The book is part theory, part casebook, part policy roadmap—and somehow still manages to be readable, even for non-lawyers. Orin’s goal? To make sense of how the Fourth Amendment should apply in a world of smartphones, cloud storage, government-preserved Facebook accounts, and surveillance everywhere.

    The core notion of the book is “equilibrium adjustment”—the idea that courts have always tweaked Fourth Amendment rules to preserve a balance between law enforcement power and personal privacy, even as technology shifts the terrain. From Prohibition-era wiretaps to the modern smartphone, that balancing act has never stopped. Orin walks us through how this theory applies to search warrants for digital devices, plain view exceptions in the age of limitless data, and the surprisingly murky question of whether copying your files counts as a seizure. It’s very persuasive, I say, if you ignore Congress’s contribution to equilibrium. In some cases, the courts are simply discovering principles in the Fourth Amendment that Congress put in statute decades earlier. Worse, courts (and Orin) have too often privileged their idea of equilibrium over the equilibrium chosen by Congress, ignoring or implicitly declaring unconstitutional compromises between privacy and law enforcement that are every bit as defensible as the courts’.

    One example is preservation orders—those quiet government requests that tell internet providers to make a copy of your account just in case. Orin argues that’s a Fourth Amendment search and needs a warrant, even if no one looks at the data yet. But preservation orders without a warrant are authorized by Congress; ignoring Congress’s work should require more than a vague notion of equilibrium rebalancing, or so I argue. Orin is unpersuaded.

    We also revisit Carpenter v. United States, the 2018 Supreme Court decision on location tracking, and talk about what it does—and doesn’t—mean for the third-party doctrine. Orin’s take is refreshingly narrow: Carpenter didn’t blow up the doctrine, but it did acknowledge that some records, even held by third parties, are just too revealing to ignore. I argue that Carpenter is the judiciary’s Vietnam war – it has committed troops to an unwinnable effort to replace the third party rule with a doomed series of touchy-feely ad hoc rulings. That said, Orin’s version of the decision, which deserves to be called the Kerr-penter doctrine, is more limited and more defensible than most of the legal (and judicial) interpretations over the last several years.

    Finally, we talk border searches, network surveillance, and whether the Supreme Court has any idea where to go next. (Spoiler: probably not.)

    続きを読む 一部表示
    1 時間 9 分
  • World on the Brink with Dmitri Alperovitch
    2024/04/22

    Okay, yes, I promised to take a hiatus after episode 500. Yet here it is a week later, and I'm releasing episode 501. Here's my excuse. I read and liked Dmitri Alperovitch's book, "World on the Brink: How America Can Beat China in the Race for the 21st Century." I told him I wanted to do an interview about it. Then the interview got pushed into late April because that's when the book is actually coming out.

    So sue me. I'm back on hiatus.

    The conversation in the episode begins with Dmitri's background in cybersecurity and geopolitics, beginning with his emigration from the Soviet Union as a child through the founding of Crowdstrike and becoming a founder of Silverado Policy Accelerator and an advisor to the Defense Department. Dmitri shares his journey, including his early start in cryptography and his role in investigating the 2010 Chinese hack of Google and other companies, which he named Operation Aurora.

    Dmitri opens his book with a chillingly realistic scenario of a Chinese invasion of Taiwan. He explains that this is not merely a hypothetical exercise, but a well-researched depiction based on his extensive discussions with Taiwanese leadership, military experts, and his own analysis of the terrain.

    Then, we dive into the main themes of his book -- which is how to prevent his scenario from coming true. Dmitri stresses the similarities and differences between the US-Soviet Cold War and what he sees as Cold War II between the U.S. and China. He argues that, like Cold War I, Cold War II will require a comprehensive strategy, leveraging military, economic, diplomatic, and technological deterrence.

    Dmitri also highlights the structural economic problems facing China, such as the middle-income trap and a looming population collapse. Despite these challenges, he stresses that the U.S. will face tough decisions as it seeks to deter conflict with China while maintaining its other global obligations.

    We talk about diversifying critical supply chains away from China and slowing China's technological progress in areas like semiconductors. This will require continuing collaboration with allies like Japan and the Netherlands to restrict China's access to advanced chip-making equipment.

    Finally, I note the remarkable role played in Cold War I by Henry Kissinger and Zbigniew Brzezinski, two influential national security advisers who were also first-generation immigrants. I ask whether it's too late to nominate Dmitri to play the same role in Cold War II. You heard it here first!

    続きを読む 一部表示
    50 分
  • Who’s the Bigger Cybersecurity Risk – Microsoft or Open Source?
    2024/04/11
    There’s a whiff of Auld Lang Syne about episode 500 of the Cyberlaw Podcast, since after this it will be going on hiatus for some time and maybe forever. (Okay, there will be an interview with Dmitri Alperovich about his forthcoming book, but the news commentary is done for now.) Perhaps it’s appropriate, then, for our two lead stories to revive a theme from the 90s – who’s better, Microsoft or Linux? Sadly for both, the current debate is over who’s worse, at least for cybersecurity. Microsoft’s sins against cybersecurity are laid bare in a report of the Cyber Security Review Board, Paul Rosenzweig reports. The Board digs into the disastrous compromise of a Microsoft signing key that gave China access to US government email. The language of the report is sober, and all the more devastating because of its restraint. Microsoft seems to have entirely lost the security focus it so famously pivoted to twenty years ago. Getting it back will require a focus on security at a time when the company feels compelled to focus relentlessly on building AI into its offerings. The signs for improvement are not good. The only people who come out of the report looking good are the State Department security team, whose mad cyber skillz deserve to be celebrated – not least because they’ve been questioned by the rest of government for decades. With Microsoft down, you might think open source would be up. Think again, Nick Weaver tells us. The strategic vulnerability of open source, as well as its appeal, is that anyone can contribute code to a project they like. And in the case of the XZ backdoor, anybody did just that. A well-organized, well-financed, and knowledgeable group of hackers cajoled and bullied their way into a contributing role on an open source project that enabled various compression algorithms. Once in, they contributed a backdoored feature that used public key encryption to ensure access only to the authors of the feature. It was weeks from being in every Linux distro when a Microsoft employee discovered the implant. But the people who almost pulled this off seemed well-practiced and well-resourced. They’ve likely done this before, and will likely do it again. Leaving all open source projects facing their own strategic vulnerability. It wouldn’t be the Cyberlaw Podcast without at least one Baker rant about political correctness. The much-touted bipartisan privacy bill threatening to sweep to enactment in this Congress turns out to be a disaster for anyone who opposes identity politics. To get liberals on board with a modest amount of privacy preemption, I charge, the bill would effectively overturn the Supreme Court’s Harvard admissions decision and impose race, gender, and other quotas on a host of other activities that have avoided them so far. Adam Hickey and I debate the language of the bill. Why would the Republicans who control the House go along with this? I offer two reasons: first, business lobbyists want both preemption and a way to avoid charges of racial discrimination, even if it means relying on quotas; second, maybe Sen. Alan Simpson was right that the Republican Party really is the Stupid Party. Nick and I turn to a difficult AI story, about how Israel is using algorithms to identify and kill even low-level Hamas operatives in their homes. Far more than killer robots, this use of AI in war is far more likely to sweep the world. Nick is critical of Israel’s approach; I am less so. But there’s no doubt that the story forces a sober assessment of just how personal and how ugly war will soon be. Paul takes the next story, in which Microsoft serves up leftover “AI gonna steal yer election” tales that are not much different than all the others we’ve heard since 2016 (when straight social media was the villain). The bottom line: China is using AI in social media to advance its interests and probe US weaknesses, but it doesn’t seem to be having much effect. Nick answers the question, “Will AI companies run out of training data?” with a clear viewpoint: “They already have.” He invokes the Hapsburgs to explain what’s going wrong. We also touch on the likelihood that demand for training data will lead to copyright liability, or that hallucinations will lead to defamation liability. Color me skeptical. Paul comments on two US quasiagreements, with the UK and the EU, on AI cooperation. And Adam breaks down the FCC’s burst of initiatives celebrating the arrival of a Democratic majority on the Commission for the first time since President Biden’s inauguration. The commission is now ready to move out on net neutrality, on regulating cars as oddly shaped phones with benefits, and on SS7 security. Faced with a security researcher who responded to a hacking attack by taking down North Korea’s internet, Adam acknowledges that maybe my advocacy of hacking back wasn’t quite as crazy as he ...
    続きを読む 一部表示
    1 時間 11 分

The Cyberlaw Podcastに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。