A number of federal employees were recently surprised to recieve a letter informing them that their professional liability insurance provider had been acquired by a Chinese company.
Latest in Privacy
Our guest for episode 119 is Kevin Kelly, founding executive editor of Wired Magazine and author of The Inevitable: Understanding the 12 Technological Forces that will Shape our Future. Kevin and I share many views – from skepticism about the recording industry’s effort to control their digital files to a similar skepticism ab
Google is pushing back against the European Union’s right to be forgotten.
The bottom line on Spokeo: If the Court’s aim was to filter out truly frivolous lawsuits while preserving Congress’s flexibility to address serious digital-age intangible harms, it has done well.
ODNI's letter seems to be more about a presumption of the report's content was than what was actually present. More critically, ODNI's response does not address the crucial issue in the encryption debate: is widespread use of secure—non backdoored, frontdoored, exceptional access—encryption technologies in our national-security interest?
Our guest for episode 115 is Orin Kerr, GWU professor and all-round computer crime guru.
We’ve distilled some of the general problems associated with exceptional access systems into a short list of warning signs to look out for in any new proposal.
Legally speaking, there’s no such thing. But sextortion turns out to be remarkably common. A great many sextortion cases have taken place―in federal courts, in state courts, and internationally―over a relatively short span of time, and they involve what are effectively online, remote sexual assaults, sometimes over great distances, sometimes even crossing international borders, and sometimes involving a great many victims.
The Lawfare Podcast: Intel Security's Chris Young on Cybersecurity and a Debate on Using Data to Protect Data
Earlier this month, Lawfare held a lunch event in partnership with Intel Security, the Hoover Institution, and the Center for Democracy and Technology on whether Big Data analytics are merely a privacy threat or whether data can also be used to protect data. The event consisted of a speech by Chris Young, general manager of Intel Security, on the current cybersecurity landscape and the way Intel Security seeks to use data to protect privacy. We then held a panel discussion debating whether and how data can be used to protect data and what the implications of that approach are.
Office of the Director of National Intelligence General Counsel Robert Litt has published a new essay in The Yale Law Journal that will likely be of interest to Lawfare readers.