Herb Lin, Lawfare

Herb Lin


Contact Herb

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

  • Unknown
  • Lawfare

Past articles by Herb:

Bolt-On vs Baked-In Cybersecurity

Real cybersecurity involves trade-offs in functional requirements. → Read More

A Hypothetical Command Vision Statement for a Fictional PLA Cyber Command

What would be the impact of other cyber powers adopting U.S. Cyber Command’s Command Vision concepts in pursuing their own security interests? → Read More

The Fourth Quadrant—the Unknown Knowns

Unknown knowns pose the most difficult problems for people and nations to address. → Read More

The Fourth Quadrant—the Unknown Knowns

Unknown knowns pose the most difficult problems for people and nations to address. → Read More

How Biden’s Cyber Strategy Echoes Trump’s

Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. → Read More

A Proposal for a Commission on the Capitol Siege

An attempt to sketch out the justification for a commission as well as the mandate, major areas of inquiry, and legislative language that are needed to guide this effort. → Read More

More Cybersecurity Problems After the Riot on the Capitol

On Jan. 6, a large number of pro-Trump rioters occupied portions of the U.S. Capitol building to protest and disrupt the counting and certification of electoral votes from the November 2020 election. The significance of this event for American democracy, the rule of law, and the depths of extremism in the U.S. populace will be addressed by others but I am compelled to point → Read More

Cybersecurity and the Occupation of the Capitol

This siege has created potentially serious cyber risks for Congress and other affected offices. → Read More

Reflections on the SolarWinds Breach

The timeline of the breach is still unfolding, but it is not too early to offer a number of high-level observations and predictions. → Read More

The Geopolitical Ramifications of Starlink Internet Service?

Starlink is a space-based internet service provider that seeks to provide high-speed (40 mbps upload, 100 mbps download ), near-global coverage of the populated world by 2021—bringing this service to locations where access previously has been unreliable, expensive or completely unavailable. Starlink has publicized the space-based segment of its platform for some time, which → Read More

Cybersecurity Lessons From the Pandemic, or Pandemic Lessons From Cybersecurity

The Cyber Solarium Commission’s new white paper explores what the coronavirus can teach us about how to prepare for a major cyber attack. But it also highlights cybersecurity principles that would have been and are relevant to responding to the current pandemic. → Read More

Developing Coronavirus Vaccines and Treatments Cooperatively and Not Competitively

The FBI and CISA are worried about intellectual property theft of coronavirus vaccines and treatments. But to develop cures quickly, the scientific community needs to think cooperatively. → Read More

The House of Representatives Needs an Audit System for Not-In-Person Voting

As the House considers establishing alternatives to in-person voting during the pandemic, it must also provide confidence that a representative’s vote has not been hacked or compromised. → Read More

‘Just Say No’ Is Not a Strategy for Supply Chain Security

Globalization has left Western end-users at least partially dependent on capabilities and services provided by foreign vendors that may not be entirely trustworthy. → Read More

Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks

In a Wall Street Journal article, a senior Huawei official acknowledged the company has a significant capability. → Read More

On the Integration of Psychological Operations with Cyber Operations

When U.S. Cyber Command gets involved with psychological operations, what is the role of military psy-ops troops? → Read More

U.S. Cyber Infiltration of the Russian Electric Grid: Implications for Deterrence

The New York Times reported on June 15 that “the United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin.” In particular, the Times reported that the United States has deployed code “inside Russia’s grid and other targets”—that is, “potentially crippling malware inside the Russian system, ... → Read More

A Method for Establishing Liability for Data Breaches

Companies holding sensitive personal information on individuals have little incentive to improve their cybersecurity postures. Congress needs to act. → Read More

On Risk Mitigation and Huawei: A Response

I don’t disagree with much that Alexei Bulazel, Sophia d’Antoine, Perri Adams and Dave Aitel wrote on Huawei and risk mitigation, and endorse almost all of their argument. → Read More

Principles of AI Governance and Ethics Should Apply to All Technologies

IT vendors are increasingly defining principles to guide the development of artificial intelligence. It’s worth taking a look at what those principles actually say. → Read More