-
Prior to last week, one might have been forgiven for thinking that Edward Snowden had fallen out of the news. Now, however, Oliver Stone’s new film Snowden and the ACLU-Amnesty International campaign to ...
-
Jack Goldsmith’s response to my call for a pardon for Edward Snowden deserves a reply. I also have a few thoughts on what Susan Hennessey and Ben Wittes have now added to the debate.
-
Let’s start with an obvious point: As Jack Goldsmith pointed out last week, President Obama is not going to pardon Edward Snowden. It’s just not going to happen. Period. And everyone involved in the camp...
-
A “pardon Snowden” campaign was launched Wednesday, in conjunction with the Snowden film. Snowden himself made the “moral case” case for why he should be pardoned, and Tim Edgar made a much more powerfu...
-
The House Permanent Select Committee on Intelligence voted unanimously on Thursday afternoon to approve a report on Edward Snowden finding that he "did tremendous damage" to U.S. national security. The e...
-
Readers will recall last spring's battle over the San Bernardino iPhone. The FBI had Syed Farook's work phone, but it was locked, with security protections including a ten-tries-and-you're-out on PIN att...
-
I have signed on to the letter asking President Obama to pardon Edward Snowden that was released today. I know this will be an unpopular position among many of my former colleagues in the national securi...
-
Michael Specter and the “Keys Under Doormats” (KUD) group have an interesting post, entitled “Apple's Cloud Key Vault, Exceptional Access, and False Equivalences” responding to my earlier post on Apple’s...
-
Author’s note: Despite appearing under my byline, this post actually represents the work of a larger group. The Keys Under Doormats group includes Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh ...
-
How Facebook's seemingly innocuous "People You May Know" suggestions can easily be used to ferret out sensitive information.
-
One of the foundational questions in surveillance law is how to distinguish between the contents of communications and non-content metadata. Identifying the line between the two is critical. Earlier this...
-
Update: That escalated quickly. This list started with 15 names of women with insight on a particular issue of law and technology policy. In just over 24 hours, we have over 230 names of a wide variety o...