Today at 10 am, the House Energy and Commerce Committee will hold a hearing entitled "Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives."
Latest in Privacy
The Lawfare Podcast: Daniel Weitzner and Benjamin Wittes on Going Dark and the Fallout from Apple v. FBI
Last week on a panel at the IAPP Global Privacy Summit in Washington D.C., Lawfare's Editor-in-Chief Ben Wittes and MIT's Daniel Weitzner discussed the fallout from the battle between Apple and the FBI and what is likely to come of the Going Dark debate.
Senators Richard Burr and Dianne Feinstein release the Compliance with Court Orders Act of 2016.
On February 29, 2016, Homeland Security Committee Chairman Michael McCaul and Senator Mark Warner, a bipartisan team, introduced legislation to create a National Commission on Security and Technology Challenges; a “Digital Commission.” In support of their effort, McCaul and Warner secured over 30 co-sponsors, as well as support from several former senior national security officials, law enforcement representatives, industry associations, and technology and security companies.
Is Apple really going to ask the FBI to disclose the vulnerability it forced the law enforcement agency to acquire?
Yesterday, the Department of Justice filed a motion to vacate a hearing previously scheduled for today on whether Apple can be compelled to unlock the iPhone of Syed Farook, one of the shooters in the San Bernardino attacks.
When it comes to privacy, the legal and technology communities are, in some ways, talking past each other.
U.S. and European Union data-regulators today reached a new legal framework that will govern the transfer of data across the Atlantic.
On Data Privacy Day, which promotes transatlantic cooperation and raises privacy awareness, we should focus on specific solutions to provide the right oversight and controls to give citizens in all countries comfort that their data will not be used inappropriately and that it will be used reasonably to protect them.
A First Step in Facilitating Searches for Bad Guys with Minimal Harm to the Privacy of the Good Guys
In a recent article in Proceedings of the National Academy of Sciences entitled "Private algorithms for the protected in social network search", Kearns et al describe algorithms for searching social networks that distinguish between good guys (those whose privacy should not be violated or violated only minimally) and bad guys (those who have fewer or lesser privacy rights).
The abstract is as follows: