-
The Pew Research Internet Project has released a new public opinion study that shows exactly what you would expect the public believes about privacy, surveillance, and related matters. The study seems to...
-
The New York Times has a useful article today on autonomous weapon systems and debate about their regulation. The issue is also on the discussion agenda this week in Geneva for the UN Convention on Cert...
-
It's ongoing now. Details are available here. and live streaming video is available over at C-SPAN.
-
Yesterday I posted a short blog on an interesting VA decision regarding the application the Fifth Amendment privilege to the question of unlocking cell phones and other devices. The short summary is tha...
-
The developing story of the FBI’s impersonation of journalists is, in a way, really the story of Timberline high school in Washington State. In June of 2007 Timberline had received a series of bomb threa...
-
The Russians are Coming. A trojan horse malware program has deeply penetrated US critical infrastructure and the Russians are probably behind it.
The Crypto-Libertarians are Not Coming. More than 400 ...
-
One of the most engaging contemporary debates is about the efficacy and utility of encryption as a means of protecting privacy. I’ve written, in the past, about how encryption works and about the growing...
-
Over at Just Security, Ryan Goodman analyzes UN Special Rapporteur Ben Emmerson's claim that states owe the same privacy protections to non-nationals abroad as to their own citizens at home in conducting...
-
Recently The Guardian reported on FBI demands new powers to hack into computers and carry out surveillance. The FBI is seeking to make several changes to Rule 41 of the Federal Rules of Criminal Procedur...
-
Stumbling around the internet last night, I found this gem: Dronestagram.
It's exactly what you would think; a free, user-built collection of videos and pictures shot by drones from all around the world.
-
And just to prove that we are equal-opportunity victims, I also saw, today, this report from Novetta on "Operation SMN" -- a report on a Chinese APT dubbed Axiom. Here's a bit of the Executive Summary:
...
-
We tend to focus our attention on Chinese APT cyber threats for good reason -- they tend to be more overt and focus on American business interests. But we should not lose sight of the fact that Russian ...