Episode 364: Does Good Ransomware Policy Have To Be Boring?

SJ
Steptoe LLP

Contributor

In more than 100 years of practice, Steptoe has earned an international reputation for vigorous representation of clients before governmental agencies, successful advocacy in litigation and arbitration, and creative and practical advice in structuring business transactions. Steptoe has more than 500 lawyers and professional staff across the US, Europe and Asia.
We don't get far into my interview with the authors of a widely publicized Ransomware Task Force report, before I object that most of its recommendations are "boring" procedural steps that...
United States Technology

1075954a.jpg

Download the 364th Episode (mp3)

  • We don't get far into my interview with the authors of a widely publicized Ransomware Task Force report, before I object that most of its recommendations are "boring" procedural steps that don't directly address the ransomware scourge. That prompts a vigorous dialogue with Philip Reiner, the Executive Director of the Institute for Security and Technology (IST), the report's sponsoring organization, from Megan Stifel, of the Global Cyber Alliance, and Chris Painter, of The Global Forum on Cyber Expertise Foundation. And we in fact find several new and not at all boring recommendations among the nearly 50 put forward in the report.
  • In the news roundup, Dmitri Alperovitch has an answer to my question, "Is Putin getting a handle on U.S. social media?" Not just Putin, but every other large authoritarian government is finding ways to bring Google, Twitter, and Facebook to heel. In Russia's case, the method is first a token fine, then a gradual throttling of service delivery that makes domestic competitors look better in comparison to the Silicon Valley brand. 
  • Mark MacCarthy handicaps the Epic v. Apple lawsuit. The judge is clearly determined to give both sides reason to fear that the case won't go well. And our best guess is that Epic might get some form of relief but not the kind of outcome they hoped for.
  • Dmitri and I marvel at the speed and consensus around regulatory approaches to the Colonial Pipeline ransomware event. It's highly likely that the attack will spur legislation mandating reports of cyber incidents (and without any liability protection) as well as aggressive security regulation from the agency with jurisdiction – TSA. I offer a cynical Washington perspective on why TSA has acted so decisively.
  • Mark and I dig into the signing and immediate court filing against Florida's social media regulation attacking common content moderation issues. Florida will face an uphill fight, but neither of us is persuaded by the tech press's claim that the law will be "laughed out of court." There is a serious case to be made for almost everything in the law, with the exception of the preposterous (and probably severable) exemption for owners of Florida theme parks.
  • Dmitri revs up the DeHyping Machine for reports that the Russians responded to Biden administration sanctions by delivering another cyberpunch in the form of hijacked USAID emails.  It turns out that the attack was garden variety cyberespionage, that the compromise didn't involve access to USAID networks, that it was launched before sanctions, and that it didn't get very far.
  • Jordan Schneider explains the impact of S. government policy on the cellular-equipment industry, and the appeal of Open RAN as a way of end-running the current incumbents. U.S. industrial policy could be transformed by the shape-shifting Endless Frontier Act.
  • Jordan and Dmitri explain how. I ask whether we're seeing a deep convergence on industrial policy on both sides of the Pacific, now that President XI has given a speech on tech policy that could have been delivered by half a dozen Republican or Democratic senators.  
  • Finally, Dmitri reviews the bidding in cryptocurrency regulation both at the White House and in London. 

In short hits, we cover:

  • And more!

As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug!

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More