Reply in Support of Objections to Report and Recommendation
Reply brief in support of January 2019 objections to magistrate judge's report and recommendation. Read more about Reply in Support of Objections to Report and Recommendation
Cybersecurity practices can now affect not only our data privacy, but also our personal safety and our democracy itself. CIS scholars combine technical knowledge with legal and policy expertise to apply interdisciplinary assessments of cybersecurity issues to real-world problems.
Reply brief in support of January 2019 objections to magistrate judge's report and recommendation. Read more about Reply in Support of Objections to Report and Recommendation
The following was excerpted from an article that will appear in a future issue of NWLawyer. The author was also recently interviewed for the “What’s Next” newsletter on LAW.COM, which you can read here. Read more about ‘Deepfakes’: A New Challenge for Trial Courts
Submission to Australia's Parliamentary Joint Committee on Intelligence and Security (PJCIS) regarding its review of the Assistance and Access Act that had passed into law in early December 2018. Read more about Submission to PJCIS Regarding Assistance and Access Act
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in public attributions in recent years has proven that attribution is far from impossible. After several years of only sporadic attributions, Western governments in 2017 began publicly attributing cyberattacks to other governments more frequently and in a more coordinated fashion. But more consistent over the past several years have been public attributions by non-governmental actors, including companies, a non-profit, and an academic institute. Read more about Decentralized Cyberattack Attribution