Hacking Team leak underscores complexity of regulating software
Among the 400 gigabytes of internal documents belonging to surveillance firm Hacking Team that were released online this week are details of the company's d…
Among the 400 gigabytes of internal documents belonging to surveillance firm Hacking Team that were released online this week are details of the company's d…
"In the Finnish court, though, that's not an unusual punishment, said Andrea Matwyshyn, a professor at the Center for Information Technology Policy at…
Among the principles that govern the current state of technology, two stand out as fundamental to our understanding of the information security problem. First,…
"A lot is riding on this appeal because the cyberstalking statute is already rarely used, said Danielle Citron, a law professor at the University of Maryla…
A talk show on KZSU-FM, Stanford, 90.1 FM, hosted by CIS Affiliate Scholar David S. Levine. The show includes guests and focuses on the intersection of technolo…
"Online advertising companies, for instance, can collect huge amounts of information about a person's browsing history, which can reveal "a very c…
"According to Danielle Citron, a cyber-law professor at the University of Maryland and author of the book Hate Crimes in Cyberspace, the ICANN policy is &q…
By: Terry Hastings and Brian Nussbaum Since 9/11, there have been billions of federal grant dollars awarded to state and local governments and an ongoing quest…
This letter is pretty remarkable. It is already beginning to attract some attention. It is interesting from the perspective of both the general subject matter…
"That’s all well and good, but what happens if they still get out of line? We all learn societal standards from a very young age, and we still commit crime…
"“No one wanted to commit to anything,” said Citron. “There used to be a period of time where I would talk about this issue and people would say, ‘Stop bei…
Cross-posted from Just Security. This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines th…