The World’s Most Popular Porn Site Is a Government Agent Now. Does It Matter?
On Monday, I published a two-part blog post about the Federal Trade Commission (FTC) settlement with Aylo, parent company of Pornhub. The FTC’s complaint allege…
On Monday, I published a two-part blog post about the Federal Trade Commission (FTC) settlement with Aylo, parent company of Pornhub. The FTC’s complaint allege…
Learning—by brains or machines—is not a copyright-relevant act. This essay argues that treating training as presumptively infringing (rescued, sometimes, by fai…
This Article tells the inside story of the rise, spread, and evolution of trust and safety. We bring unique perspectives to this story. One of us (Citron) was o…
The Mueller investigation has just indicted 13 Russian nationals, and three Russian organizations, including the notorious St. Petersburg troll factory, the Int…
Just Security is pleased to announce the launch of an online symposium on United States v. Microsoft, which will be argued at the U.S. Supreme Court on February…
Following the rout of the Islamic State of Iraq and the Levant (ISIL) in and around Raqqa, hundreds of ISIL fighters are now in the custody of US-backed opposit…
Abstract. Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they…
Imagine it is the spring of 2019. A bottom-feeding website, perhaps tied to Russia, “surfaces” video of a sex scene starring an 18-year-old Kirsten Gillibrand.…
Corey Robin is the author of “The Reactionary Mind: Conservatism from Edmund Burke to Donald Trump.” The New Yorker described the first edition of this book as…
Abstract In the wake of a series of destabilizing and damaging cyber attacks ranging from Equifax to Yahoo!, there has been a growing call for the U.S. governm…
By DIPAYAN GHOSH AND BEN SCOTT Ghosh, a White House technology and economic adviser from 2014–2015 and former privacy policy expert at Facebook, is a Fellow at…
These comments address the issue of transparency under the GDPR, as that topic arises in the context of Internet intermediaries and the “Right to Be Forgotten.”…
Security vulnerabilities in technology extend well beyond problems with software. Earlier this month, researchers revealed that the hardware at the heart of nea…
When someone wants to remove speech from the Internet, the Digital Millennium Copyright Act’s (DMCA) notice and takedown process can provide the quickest path.…
The American foreign-policy community has spent the past year arguing about how to counter Russian influence operations. Newspapers such as the New York Times h…