-
A recent opinion piece in The Hill concerning lack of arrests in the Shadow Brokers and Vault 7 cases argues that this primarily demonstrates the government’s general inability to stop insider leaks. Ano...
-
Former NSA Tailored Access Operations (TAO) developer Nghia Hoang Pho pleaded guilty on Friday to willful retention of national defense information. Pho faces a maximum of ten years in prison for removin...
-
On Monday, the Justice Department unveiled an indictment of three Chinese nationals employed by Chinese cybersecurity firm Boyusec (博御信息), charging them with hacking into the computer systems of Moody’s ...
-
A bill from a strong bipartisan group of House members may reinstate and elevate a version of the cyber coordinator position eliminated as part of Secretary of State Rex Tillerson’s controversial “redesi...
-
The Future of Life Institute recently released “Slaughterbots,” a seven-minute video that looks like an episode of Black Mirror (a science-fiction anthology show focused on technology-induced nightmares).
-
The spread of commercially available encryption products has made it harder for law enforcement officials to access to information that relates to criminal and national security investigations. In Octobe...
-
Terrorist groups, like everyone else today, rely on the internet. Al-Qaeda in Iraq made its name disseminating hostage beheading videos. Omar Hammami became a Twitter star for the Somali jihadist group a...
-
The U.S.
-
On Lawfare's feed at Foreign Policy, I wrote about how the progress of the "Stop Enabling Sex Traffickers Act of 2017" may signal the beginning of the end of technology companies' protection from liabili...
-
The next National Defense Authorization Act (the NDAA FY’18) is nearing the finish line. A Conference Report is now available, and so the time has come for a closer look at some of the key provisions of...
-
Information Technology Provider Holds Company Hostage
In 2011, a victim company wanted a website. Tavis Tso, a provider of information technology (IT) services for the company, set up a GoDaddy account...
-
Technology presents both consumer convenience and risk, creating a conflict between security and privacy as government agencies seek to weaken the protections that consumers want heightened.