-
Insider threats rightly occupy a significant portion of the public discussion (and private debate inside corporations and government agencies) about cybersecurity. The company employee who intentionally ...
-
As I explained in my last post, American constitutional law requires that plaintiffs show they have been the subject of surveillance in order to establish standing to challenge intelligence programs in c...
-
Earlier today, the Senate passed the Cybersecurity Information Sharing Act (CISA) by a vote of 74-21. Early reports are that most of the more significant privacy-related amendments were rejected, as was...
-
Editor’s Note: The drone program remains controversial, and critics regularly blast it for creating more terrorists than it kills. Prominent among these critics is Glenn Greenwald, a founding editor of T...
-
Attorneys from Apple and the Department of Justice spoke yesterday before Judge James Orenstein of the District Court for the Eastern District of New York at a hearing on a high-profile case regarding en...
-
At the request of Judge James Orenstein of the U.S. District Court for the Eastern District of New York, over the course of last week, Apple filed two briefs and the government filed one regarding the fe...
-
-
The New York Post recently reported on a hacker who claimed to have gained access to CIA Director John Brennan’s personal email account. The hacker then bragged to Wired magazine about how he did it.
-
In an earlier post, I advanced the idea that the drone registration process could be used to make actual drone operation safer.
In principle, there are two approaches to make drone operation safer. Ap...
-
On October 8, Governor Jerry Brown of California approved Senate Bill (S.B.) 178, or the California Electronic Communications Privacy Act, designed to designed to strengthen electronic privacy against la...
-
Assistant Attorneys General John Carlin (National Security Division) and Leslie Caldwell (Criminal Division) spoke last week at Roger Williams’ Cybersecurity conference, outlining an innovative approach ...
-
Just a few weeks ago, at a summit between Presidents Obama and Xi, the Chinese leader famously promised to end China's cyber economic espionage. Some, like me, saw this as an empty promise. Others, lik...