Press

CIS in the news.

  • Inside the military tactics used during Standing Rock

    Date published: 
    June 10, 2017

    "But the information provided by TigerSwan could have helped police forces overcome that prohibition. Elizabeth Joh, a private security legal scholar at the University of California, Davis, referred to such techniques as a “potential end run on the basic constitutional restraints we place upon police.”"

  • Are Geek Squad agents spying for the FBI?

    Date published: 
    June 9, 2017

    "Finding child porn is one thing; courts have typically deferred to law enforcement on such matters, said Scott Shackelford, an associate professor of business law and ethics who chairs the cybersecurity program at Indiana University in Bloomington.

    But if the feds’ data snooping extends beyond illicit pictures, “it poses some prickly issues on (the) FBI’s engagement with (Best Buy) employees,” Shackelford said."

  • Privacy vs. Security: Experts Debate Merits of Each in Tech-Rich World

    Date published: 
    June 7, 2017

    "On the other side of the argument, Catherine Crump, acting director of Samuelson Law for the Berkeley School of Law, focused her argument on the dangers of providing a backdoor to any device to the government and expect it to only be used by the “good guys.”

    She drew a parallel between handing the FBI a second master key to iPhones and recent worldwide WannaCry ransomware attack, which was launched using leaked National Security Agency (NSA) exploits. 

  • Twitter users, blocked by Trump, cry censorship

    Date published: 
    June 6, 2017

    "Morgan Weiland, an affiliate scholar with Stanford Law School’s Center for Internet and Society, says the blocked tweeters’ complaint could air key questions if it ends up in court. Does the public forum concept apply in privately run social media? Does it matter if an account is a politician’s personal account, not an official one?"

  • Trump's Twitter Blocking May Violate First Amendment

    Date published: 
    June 6, 2017

    ""The question of whether the President’s Twitter feed is a public forum is a more complicated question," says Neil Richards, a professor at Washington University's Law school, specializing in First Amendment theory. "The law here is famously muddled, because it’s trying to prevent the government from discriminating against people who speak on public streets and parks, but it’s trying to fight the urge to make everything a public forum.""

  • Major web companies and public interest groups Announce Internet-Wide Day of Action to Save Net Neutrality

    Date published: 
    June 6, 2017

    "Malkia Cyril, executive director at the Center for Media Justice, said: “Communities of color across the United States depend on an open Internet to thrive. From resisting police violence to demanding fair wages – the political voice and economic opportunity that the Internet enables must remain protected by Title II net neutrality. Trump’s FCC seeks to wall these communities off from the power of the internet as a mobilizing tool and an equalizer.

  • Paramilitary security tracked and targeted #noDAPL activists, docs show

    Date published: 
    June 2, 2017

    "But the information provided by TigerSwan could have helped police forces overcome that prohibition. Elizabeth Joh, a private security legal scholar at UC Davis, referred to such techniques as a “potential end run on the basic constitutional restraints we place upon police.”"

  • Donald Trump's mobile phone use worries former Obama tech officer

    Date published: 
    June 1, 2017

    "Andrew McLaughlin, former deputy chief technology officer for the Obama administration, said the vulnerabilities were a concern.

    "What we ended up with was a military-grade, encrypted phone that had the microphone ripped out," Mr McLaughlin said, adding that he thinks the White House communications office has prevailed upon Mr Trump to use some kind of phone with enhanced security.

    He suggested one with strong encryption, disabled location services and one that talks with a military network instead of commercial cell services.

  • States 'awaken' to critical infrastructure cyberthreats

    Date published: 
    May 30, 2017

    ""The election did do a lot to awaken the state and local governments that had perhaps not thought so much about cybersecurity," said Brian Nussbaum, assistant professor at the University of Albany's College of Emergency Preparedness, Homeland Security and Cybersecurity in New York.

  • Telegraph Cyber Security reveals there’s plenty business can do to prevent another WannaCry

    Date published: 
    May 26, 2017

    "Simple though this sounds, if companies are to ensure they’re adequately defended against even comparatively unsophisticated attacks, it’s vital for CTOs and chief information security officers (CISO) to have the full buy-in of their boards. “What I’ve found in talking to boards is there tends to be a nodding and looking serious, rather than actually an understanding what you’re talking about,” quipped Gail Kent, global public policy manager at Facebook. "

  • New Bill Aims To Get More Driverless Cars On Texas Roads

    Date published: 
    May 26, 2017

    "Despite Tesla's claim of a self-driving car out this year, several companies are aiming for 2020 and beyond for a production model. University of South Carolina Assistant Professor of Law Bryant Walker Smith says there are a lot of miles before companies can claim their automated cars are as safe as conventional ones. 

  • Sophistication Of Manchester Bomb Implies There Was Help

    Date published: 
    May 25, 2017

    "“What is important to remember about video cameras is that they are not preventative measures, rather they are exceptionally useful – but for forensics and investigation after the fact,” said Brian Nussbaum, Ph.D., assistant professor, University at Albany’s College of Emergency Preparedness, Homeland Security, and Cybersecurity. “There were and are security measures in place in Manchester. But security measures that can prevent a lone attacker who is outside a security cordon for a major event from setting of a bomb are probably not realistic in most places.”"

Pages