The Cyberlaw Podcast

It’s that time again on the Congressional calendar. All the big, bipartisan tech initiatives that looked so good a few months ago are beginning to compete for time on the floor like fat men desperate to get through a small door. And tech lobbyists are doing their best to hinder the bills they hate while advancing those they like.

We open the Cyberlaw Podcast by reviewing a few of the top contenders. Justin (Gus) Hurwitz tells us that the big bipartisan compromise on privacy is probably dead for this Congress, killed by Senator Maria Cantwell (D-WA) and the new politics of abortion. The big subsidy for domestic chip fabs is still alive, Jamil Jaffer but beset by House and Senate differences, plus a proposal to regulate outward investment by U.S. firms that would benefit China and Russia. And Senator Amy Klobuchar’s (D-MIN) platform anti-self-preferencing bill is being picked to pieces by lobbyists trying to cleave away Republican votes over content moderation and national security.  

David Kris unpacks the First Circuit decision on telephone pole cameras and the fourth amendment. Technology and Fourth Amendment law is increasingly agoraphobic, I argue, as aging boomers find themselves on a vast featureless constitutional plain, with no precedents to guide them and forced to fall back on their sense of what was creepy in their day.

Speaking of creepy, the Australian Strategic Policy Institute (ASPI) has a detailed report on just how creepy content moderation and privacy protections are at TikTok and WeChat. Jamil gives the highlights.   

Not that Silicon Valley has anything to brag about. I sum up This Week in Big Tech Censorship with two newly emerging rules for conservatives on line: First, obeying Big Tech’s rules is no defense; it just takes a little longer before your business revenue is cut off. Second, having science on your side is no defense. As a Brown University doctor discovered, citing a study that undermines Centers for Disease Control and Prevention (CDC) orthodoxy will get you suspended. Who knew we were supposed to follow the science with enough needle and thread to sew its mouth shut?

If Sen. Klobuchar fails, all eyes will turn to Lina Khan’s Federal Trade Commission, Gus tells us, and its defense of the right to repair” may give a clue to how it will regulate

David flags a Google study of zero-days sold to governments in 2021. He finds it a little depressing, but I note that at least some of the zero-days probably require court orders to implement.

Jamil also reviews a corporate report on security, Microsoft’s analysis of how Microsoft saved the world from Russian cyber espionage—or would have if you ignoramuses would just buy more cloud services. OK, it’s not quite that bad, but the marketing motivations behind the report show a little too often in what is otherwise a useful review of Russian tactics. 

In quick hits:

Gus tells us about a billboard that can pick your pocket: In NYC, naturally. 

And David and I talk marijuana and security clearances. If you listen to the podcast for career advice, it’s a long wait, but David delivers Security Agency Counsel after a long series of acting General Counsels.

Direct download: TheCyberlawPodcast-414.mp3
Category:general -- posted at: 10:48am EDT

This episode of the Cyberlaw Podcast begins by digging into a bill more likely to transform tech regulation than most of the proposals you’ve actually heard of—a bipartisan effort to repeat U.S. Senator John Cornyn’s bipartisan success in transforming the Committee on Foreign Investment in the United States (CFIUS) four years ago. The new bill holds a mirror up to CFIUS, Matthew Heiman reports. Where CFIUS regulates inward investment from adversary nation, the new proposal will regulate outward investment—from the U.S. to adversary nations. The goal is to slow the transfer of technical expertise (and capital) from the U.S. to China. It is opposed by the Chinese government and the same U.S. business alliance that angered Senator Cornyn in 2018. If it passes, I predict, it will be as part of must-pass legislation and will be a big surprise to most technology observers.

The cryptocurrency world might as well make Leslie Gore its official chanteuse, because everyone is crying at the end of the crypto party. Well, except for Nick Weaver, who does a Grand Tour of all the overleveraged cryptocurrency firms on or over the verge of collapse as bitcoin values drop to $20 thousand and below.               

Scott Shapiro and I trade views on the spate of claims that Microsoft is downgrading security in its products. It would unfortunately make sense for Microsoft to strip-mine value from its standalone proprietary software by stinting on security, we think, but we can’t explain why it would neglect cloud security as it is increasingly accused of doing.              

That brings us to NickTalk about TikTok, and a behind-the-scenes look at what has happened to the TikTok-CFIUS case in the years since former President Donald Trump left the stage. Turns out that CFIUS has been doggedly pursuing pieces of the deal that were still on the table in 2020: localization in the U.S. for U.S. user data and no Chinese access to the data. The first is moving forward, Nick tells us; the second is turning out to be a morass.

Speaking of localization, India’s determination to localize credit card data has been rewarded. Matthew reports that cutting off new credit card customers did the trick: Mastercard has localized its data, and India has lifted the ban.

Scott reports on Japan’s latest contribution to the techlash: a law that makes 'online insults' a crime.

Scott also reports on a modest bright spot in NSO Group ’s litigation with Facebook: The Supreme Court answered the company’s plea, calling on the U.S. government to comment on whether NSO could claim sovereign immunity for the hacking tools it sells to government. Nick puts his grave dancing shoes back on to report the bad news for NSO: the Biden administration is trashing a rumored acquisition by U.S. - based L3Harris Technologies

Scott makes short work of the idea that a Google AI chatbot has achieved sentience. Of course, as a trained philosopher, Scott seems a little reluctant to concede that I’ve achieved sentience. We do agree that it’s a hell of a good chatbot.

And in quick hits, I note the appointment of April Doss as General Counsel for the National Security Agency Counsel after a long series of acting General Counsels.

Direct download: TheCyberlawPodcast-413.mp3
Category:general -- posted at: 9:57am EDT

This bonus episode of the Cyberlaw Podcast is an interview with Amy Gajda, author of “Seek and Hide: The Tangled History of the Right to Privacy.” Her book is an accessible history of the often obscure and sometimes “curlicued” interaction between the individual right to privacy and the public’s (or at least the press’s) right to know. Gajda, a former journalist, turns what could have been a dry exegesis on two centuries of legal precedent into a lively series of stories behind the case law. All the familiar legal titans of press and privacy—Louis Brandeis, Samuel Warren, Oliver Wendell Holmes—are there, but Gajda’s research shows that they weren’t always on the side they’re most famous for defending. 

This interview is just a taste of what Gajda’s book offers, but lawyers who are used to a summary of argument at the start of everything they read should listen to this episode first if they want to know up front where all the book’s stories are taking them.

Direct download: TheCyberlawPodcast-412.mp3
Category:general -- posted at: 11:43pm EDT

Francisco last week at the Rivest-Shamir-Adleman (RSA) conference.  We summarize what they said and offer our views of why they said it.

Bobby Chesney, returning to the podcast after a long absence, helps us assess Russian warnings that the U.S. should expect  a “military clash” if it conducts cyberattacks against Russian critical infrastructure. Bobby, joined by Michael Ellis sees this as a routine Russian PR response to U.S. Cyber Command and Director, Paul M. Nakasone’s talk about doing offensive operations in support of Ukraine.

Bobby also notes the FBI analysis of the NetWalker ransomware gang, an analysis made possible by seizure of the gang’s back office computer system in Bulgaria. The unfortunate headline summary of the FBI’s work was a claim that “just one fourth of all NetWalker ransomware victims reported incidents to law enforcement.” Since many of the victims were outside the United States and would have had little reason to report to the Bureau, this statistic undercounts private-public cooperation. But it may, I suggest, reflect the Bureau’s increasing sensitivity about its long-term role in cybersecurity.  

Michael notes that complaints about a dearth of private sector incident reporting is one of the themes from the government’s RSA appearances. A Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) executive also complained about a lack of ransomware incident reporting, a strange complaint considering that CISA can solve much of the problem by publishing the reporting rule that Congress authorized last year. 

In a more promising vein, two intelligence officials underlined the need for intel agencies to share security data more effectively with the private sector. Michael sees that as the one positive note in an otherwise downbeat cybersecurity report from Avril Haines, Director of National Intelligence. And David Kris points to a similar theme offered by National Security Agency official Rob Joyce who believes that sharing of (lightly laundered) classified data is increasing, made easier by the sophistication and cooperation of the cybersecurity industry. 

Michael and I are taking with a grain of salt the New York Times’ claim that Russia’s use of U.S. technology in its weapons has become a vulnerability due to U.S. export controls.  We think it may take months to know whether those controls are really hurting Russia’s weapons production.  

Bobby explains why the Department of Justice (DOJ) was much happier to offer a “policy” of not prosecuting good-faith security research under the Computer Fraud and Abuse Act instead of trying to draft a statutory exemption. Of course, the DOJ policy doesn’t protect researchers from civil lawsuits, so Leonard Bailey of DOJ may yet find himself forced to look for a statutory fix. (If it were me, I’d be tempted to dump the civil remedy altogether.)  

Michael, Bobby, and I dig into the ways in which smartphones have transformed both the war and, perhaps, the law of war in Ukraine. I end up with a little more understanding of why Russian troops who’ve been flagged as artillery targets in a special Ukrainian government phone app might view every bicyclist who rides by as a legitimate target.

Finally, David, Bobby and I dig into a Forbes story, clearly meant to be an expose, about the United States government’s use of the All Writs Act to monitor years of travel reservations made by an indicted Russian hacker until he finally headed to a country from which he could be extradited.

Direct download: TheCyberlawPodcast-411.mp3
Category:general -- posted at: 10:42am EDT

If you’ve been worrying about how a leaky U.S. government can possibly compete with China’s combination of economic might and autocratic government, this episode of the Cyberlaw Podcast has a few scraps of good news. The funniest, supplied by Dave Aitel, is the tale of the Chinese gamer who was so upset at the online performance of China’s tanks that he demanded an upgrade. When it didn’t happen, he bolstered his argument by leaking apparently classified details of Chinese tank performance. I suggest that U.S. intelligence should be subtly degrading the online game performance of other Chinese weapons systems we need more information about. 

There may be similar comfort in the story of Gitee, a well-regarded Chinese competitor to Github that ran into a widespread freeze on open source projects. Jane Bambauer and I speculate that the source of the freeze was government objections to something in the code or the comments in several projects. But guessing at what it takes to avoid a government freeze will handicap China’s software industry and make western companies more competitive than one would expect.

In other news, Dave unpacks the widely reported and largely overhyped story of Cyber Command conducting “hunt forward” operations in support of Ukraine. Mark MacCarthy digs into Justice Samuel A. Alito Jr.’s opinion explaining why he would not have reinstated the district court injunction against Texas’s social media regulation. Jane and I weigh in. The short version is that the Alito opinion offers a plausible justification for upholding the law. It may not be the law now, but it could be the law if Justice Alito can find two more votes. And getting those votes may not be all that hard for a decision imposing more transparency requirements on social media companies.

Mark and Jane also dig deep on the substance and politics of national privacy legislation. Short version: House Democrats have made substantial concessions in the hopes of getting a privacy bill enacted before they must face what’s expected to be a hostile electorate. But Senate Democrats may not be willing to swallow those concessions, and Republican members may think they will do better to wait until after November. Impressed by the concessions, Jane and Mark hold out hope for a deal this year. I don’t.

Meanwhile, Jane notes, California is driving forward with regulations under its privacy law that are persuading Republicans that preemption has lots of value for business. 

Finally, revisiting two stories from earlier weeks, Dave notes 

Download the 410th Episode (mp3) 

You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug!

The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

Direct download: TheCyberlawPodcast-410.mp3
Category:general -- posted at: 9:42am EDT

At least that’s the lesson that Paul Rosenzweig and I distill from the recent 11th Circuit decision mostly striking down Florida’s law regulating social media platforms’ content “moderation” rules. We disagree flamboyantly on pretty much everything else—including whether the court will intervene before judgment in a pending 5th Circuit case where the appeals court stayed a district court’s injunction and allowed Texas’s similar law to remain in effect.  

When it comes to content moderation, Silicon Valley is a lot tougher on the Libs of TikTok than the Chinese Communist Party (CCP). Instagram just suspended the Libs of Tiktok account, I report, while a recent Brookings study shows that the Chinese government’s narratives are polluting Google and Bing search results on a regular basis. Google News and YouTube do the worst job of keeping the party line out of searches. Both Google News and YouTube return CCP-influenced links on the first page about a quarter of the time.              

I ask Sultan Meghji to shed some light on the remarkable TerraUSD cryptocurrency crash. Which leads us, not surprisingly, from massive investor losses to whether financial regulators have jurisdiction over cryptocurrency. The short answer: Whether they have jurisdiction or not, all the incentives favor an assertion of jurisdiction. Nick Weaver is with us in spirit as we flag his rip-roaring attack on the whole fiel—a don’t-miss interview for readers who can’t get enough of Nick. 

It’s a big episode for artificial intelligence (AI) news too. Matthew Heiman contrasts the different approaches to AI regulation in three big jurisdictions. China’s is pretty focused, Europe’s is ambitious and all-pervading, and the United States isn’t ready to do anything. 

Paul thinks DuckDuckGo should be DuckDuckGone after the search engine allowed Microsoft trackers to follow users of its browser. 

Sultan and I explore ways of biasing AI algorithms. It turns out that saving money on datasets makes the algorithm especially sensitive to the order in which the data is presented. Debiasing with synthetic data has its own risks, Sultan avers. But if you’re looking for good news, here’s some: Self-driving car companies who are late to the party are likely to catch up fast, because they can build on a lot of data that’s already been collected as well as new training techniques.

Matthew breaks down the $150 million fine paid by Twitter for allowing ad targeting of the phone numbers its users supplied for two-factor authentication (2FA) security purposes.

Finally, in quick hits:

 

 

Download the 409th Episode (mp3)

 

You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug!

The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families or pets.

Direct download: TheCyberlawPodcast-409.mp3
Category:general -- posted at: 1:26pm EDT

1