Exigent Circumstances: iOS 12’s USB Restricted Mode and Warrantless iPhone Access
Apple recently confirmed the introduction of a new feature called “USB Restricted Mode” in the latest version of the iPhone’s mobile operating system, iOS 12. I…
Apple recently confirmed the introduction of a new feature called “USB Restricted Mode” in the latest version of the iPhone’s mobile operating system, iOS 12. I…
Last week, Deputy Attorney General Rod Rosenstein gave a speech about encryption that prompted a considerable amount of well-deserved blowback. His speech rehas…
In our previous posts, we’ve argued that the NSA is collecting massive amounts of data about US citizens under conditions that have nothing to do with terrorism…
Last week, we argued that the public discussion surrounding two of the government’s most controversial mass surveillance programs – PRISM and Upstream – has not…
The legal authority behind the controversial PRISM and Upstream surveillance programs used by the NSA to collect large swaths of private communications from lea…
Last week, at an event co-hosted by Just Security and NYU’s Brennan Center for Justice, the NSA’s Civil Liberties and Privacy Director Rebecca Richards dropped…
"To remedy this, the new law is "technology neutral," said Jeffrey Vagle, executive director of the Center for Technology, Innovation and Competi…
A talk show on KZSU-FM, Stanford, 90.1 FM, hosted by CIS Affiliate Scholar David S. Levine. The show includes guests and focuses on the intersection of technolo…
It should be clear to even casual observers today that the “golden age of surveillance” thesis is fundamentally correct. We live in a time when far more data an…
Cross-posted from Just Security. This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines th…
By Patrick Eddington and Jennifer Granick Senator Rand Paul, joined by Senator Wyden and other surveillance reform advocates, as well as five members of the Ho…