Up from below: tackling cyber threats
More nations in the Asia-Pacific are adopting a bottom-up approach to cybersecurity regulation. That’s a good thing, Scott Shackelford writes. Cybersecurity is…
More nations in the Asia-Pacific are adopting a bottom-up approach to cybersecurity regulation. That’s a good thing, Scott Shackelford writes. Cybersecurity is…
I don't think I need to reiterate how important the battle over the future of encryption is. It's not new, but rather the latest clash in a fight that h…
"While some proponents of both have laudable goals–protecting the intellectual property of innovators and building intelligence that can save lives–the dan…
"Andrea Matwyshyn, a scholar at Stanford Law School's Center for Internet and Society and a professor at Boston's Northeastern University School of…
""The justices had phones [by 1967], and they knew that they talked about their most private stuff on those phones," says Jennifer Stisa Granick,…
""Judge Orenstein ruled the FBI’s request would 'thoroughly undermine fundamental principles of the Constitution’ and we agree," an Apple spo…
By now, the details of Apple’s fight with the FBI are well known: the FBI wants access to an iPhone belonging to the deceased terrorism suspect Syed Farook, who…
"We know that one photo can ruin your career,” said Danielle Citron, a law professor at the University of Maryland and author of the book “Hate Crimes in C…
""The FBI's interest in this narrow case overshadows a wealth of other important American interests," says Jennifer Granick, director of civi…
“Tool Without a Handle”: Tools for Terror; Tools for Peace This blog has addressed principles and challenges in countering odious online content – both conten…
"“Part of the conversation is whether the FBI has sufficient training and access to technology (to do its job). Asking the private sector to help is not th…
"However, the most interesting filing of all may be the one filed by a group of iPhone Security and Applied Cryptography Experts, and put together by Jenni…