Press

CIS in the news.

  • In terror fight, tech companies caught between US and European ideals

    Date published: 
    June 23, 2017

    "“It’s so easy to point to the need for internet companies to do more that that becomes a real rallying cry,” says Daphne Keller, the director of Intermediary Liability at Stanford Law School’s Center for Internet and Society, and a former associate general counsel to Google. “In European lawmaking, they don’t have very good tech advice on what’s really possible.

  • Security experts warn lawmakers of election hacking risks

    Date published: 
    June 21, 2017

    "More than a hundred security researchers and computer science experts have warned in a letter to lawmakers that not enough is being done to ensure the integrity of state and federal elections.

    The letter, published Wednesday, argues many US states are "inadequately prepared" to respond to cybersecurity risks with upcoming elections."
     
    Affiliate Scholar Brian Nussbaum and Non-Residential Fellow Aleecia McDonald were signers. 
     
  • How Uber's toxic culture forced Kalanick out

    Date published: 
    June 21, 2017

    "All of these signals about Uber's culture matter. "Uber wants to court investors, employees, drivers, and riders," said Bryant Walker Smith, professor at the University of South Carolina and one of the leading experts on the legal aspects of self-driving cars. "Particularly for the first two, image and vision matter—and can be heavily influenced in fact and perception by a public-facing leader.""

  • Supreme Court Hints That Trump Can’t Legally Block You on Twitter

    Date published: 
    June 20, 2017

    ""It's to the credit of these companies that they have—without admitting it in court—taken the responsibility of the custodians of public debate," said Neil Richards, a law professor at Washington University in St. Louis who specializes in the First Amendment. "We have to decide if that's a question we want to have left to a publicly traded corporation.""

  • The Supreme Court Just Protected Your Right to Facebook

    Date published: 
    June 19, 2017

    ""The Supreme Court appropriately understood the importance of the internet to the way politics and free expression occur right now," says Neil Richards, a professor at Washington University Law School, who specializes in First Amendment law. "We cannot have a functioning First Amendment that doesn't take First Amendment activity in a digital context into account.""

  • The Texting Suicide Case Is About Crime, Not Tech

    Date published: 
    June 16, 2017

    "And yet, according to Danielle Citron, author of the book Hate Crimes in Cyberspace, there are 21 crimes that have to do explicitly with speech—things like threats, extortion, aiding and abetting, and conspiracy. None of these types of speech are protected by the First Amendment. “If the First Amendment’s a house, where inside speech is protected, threats can’t walk in the door. Neither can extortion. Neither can solicitation of a crime,” Citron says. In other words, not all speech is covered by the First Amendment's proverbial roof."

  • House Judiciary Continues Email Privacy Law Overhaul Debate

    Date published: 
    June 16, 2017

    "Richard Salgado, director of law enforcement and international security at Google, said in response to questions from Rep. Doug Collins (R-Ga.) that ECPA “is pretty aged” and updates to the law are “quite urgent.” ECPA overhaul “increases privacy protections and enhances law enforcement access” to data stored abroad, he said."

  • Youth is no defence when it comes to shameful online posts

    Date published: 
    June 16, 2017

    "According to Danielle Citron, a professor at the University of Maryland Carey School of Law, and a leader in the fight against online harassment and revenge porn, there need to be repercussions for harmful online behaviour, just as there are consequences for the offline equivalent.

    "It's true that we are in the early stages of learning about the harm that can result from online behaviour, but we should view what happens online and off the same way."

  • Inside the ACLU’s nationwide campaign to curb police surveillance

    Date published: 
    June 14, 2017

    "When you pass a law, you create legality where there wasn’t,” says Malkia Cyril of the Center for Media Justice, a Bay Area nonprofit. “We create the legal framework where they can be legally abused.”

    Cyril is opposed to police body cameras, and is skeptical that use policies, such as those arbitrated through CCOPS legislation, will be enough to rein in the abuse of surveillance in over-policed communities.

    “Whether or not you have a use policy, does not mean there’s a way to enforce a use policy,” Cyril says."

  • Inside the military tactics used during Standing Rock

    Date published: 
    June 10, 2017

    "But the information provided by TigerSwan could have helped police forces overcome that prohibition. Elizabeth Joh, a private security legal scholar at the University of California, Davis, referred to such techniques as a “potential end run on the basic constitutional restraints we place upon police.”"

  • Are Geek Squad agents spying for the FBI?

    Date published: 
    June 9, 2017

    "Finding child porn is one thing; courts have typically deferred to law enforcement on such matters, said Scott Shackelford, an associate professor of business law and ethics who chairs the cybersecurity program at Indiana University in Bloomington.

    But if the feds’ data snooping extends beyond illicit pictures, “it poses some prickly issues on (the) FBI’s engagement with (Best Buy) employees,” Shackelford said."

  • Privacy vs. Security: Experts Debate Merits of Each in Tech-Rich World

    Date published: 
    June 7, 2017

    "On the other side of the argument, Catherine Crump, acting director of Samuelson Law for the Berkeley School of Law, focused her argument on the dangers of providing a backdoor to any device to the government and expect it to only be used by the “good guys.”

    She drew a parallel between handing the FBI a second master key to iPhones and recent worldwide WannaCry ransomware attack, which was launched using leaked National Security Agency (NSA) exploits. 

Pages