This is the latest entry in my lengthy archive of writing, talks, and interviews about the EARN IT Act:
* Blog posts here at the CIS blog: part 1, part 2, par…
Recently, I wrote for Lawfare about Sen. Dick Durbin (D-IL)’s new STOP CSAM Act bill, S.1199. The bill text is available here. There are a lot of moving parts i…
In early 2022 I was asked to write a brief statement on an academic vision for AI ethics. As this topic has become only more important in the year since, I thou…
A new article, written in 2022 and published in 2023 -- with pictures!
The article asks a leading AI tool for image generation to illustrate the facts of a lea…
In early 2022 I was asked to write a brief statement on an academic vision for AI ethics. As this topic has become only more important in the year since, I thou…
I was recently invited to a private workshop on children's online safety policy, where I gave a short presentation about the U.S. legal context. Here are my…
What is the National Cybersecurity Strategy? A cybersecurity expert explains what it is and what the Biden administration has changed
Richard Forno, University…
I. Intro
Artificial intelligence (“AI”) use has blossomed. The AI market was valued at $27.3 in 2019 and is projected to grow to $266.92 billion b…
While many users remain blissfully unaware, a battle is raging for the future of the internet. On the one hand are the large phone and cable companies who want…
The UK Government is proposing to change the law to make it easier for them to prosecute those who sell or possess “sophisticated encrypted communications devic…
Last week, Apple announced several new security features: the ability to authenticate contacts in iMessage (reminiscent of Signal’s verification feature), suppo…
I'm pleased to announce that my latest law journal article has just been published in the new issue of the Richmond Journal of Law and Technology: Shooting…