Yet Another Reason To Think Before You Sext: Pedophile Porn Sites Are Stealing Girls' Pics
""Before, images might have been shown or passed around to other kids in person, which is bad enough," says Danielle Citron, a law professor at t…
""Before, images might have been shown or passed around to other kids in person, which is bad enough," says Danielle Citron, a law professor at t…
"“We’re still guessing,” says Richard Salgado, Google’s director of information security and law enforcement. “We’re not the author of those slides. We hav…
Cross-posted from Forbes. A well-intentioned grandmother accidentally hurt her grandkids’ feelings. She took screenshots of their delightful Instagram photos a…
"Danielle Citron, a University of Maryland law professor who focuses on Internet threats, charted the popular response to Internet death and rape threats i…
Cross-posted from The Atlantic. If our leaders don’t even use email, can we trust them to make decisions about our brave new e-world? In a book released a few…
If there ever was a “year of privacy,” surely it was 2013. A year that ends with dictionary.com selecting “privacy” as “word of the year;” with privacy making f…
Cross-posted from Just Security. When should courts follow legal precedent and when should the law change? This is a debate that underlies this month’s contra…
"The National Security Agency likes to claim that intelligence officers are only collecting the phone records of millions of Americans, safely omitting the…
Co-authored with Patrick Mutchler. This is a project of the Stanford Security Lab. Just over a month ago we launched MetaPhone, an Android app for crowdsourcin…
Cross-posted from CNN. When President Barack Obama responded to this summer's torrent of disclosures about the National Security Agency by commissioning a…
“Tool Without A Handle: Getting a Grip” In my last post, I explored how law influences use of information technology through both rules and a concomitant degr…
Yesterday, I wrote that the report from the President’s Review Group on Intelligence and Communications Technologies--"Liberty And Security In A Changing W…