Recent proposals to search the cellphones and social media profiles of visitors arriving at the U.S. border raise serious legal questions and are unwise from a policy perspective.
Latest in Privacy: Technology
In a paper released today at a Brookings panel discussion, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.
The Second Circuit Court of Appeals ruled today that the Stored Communications Act "does not authorize courts to issue and enforce against U.S.-based service providers warrants for the seizure of customer e-mail content that is stored exclusively on foreign servers."
We’ve distilled some of the general problems associated with exceptional access systems into a short list of warning signs to look out for in any new proposal.
This morning, Benjamin Wittes hosted an online webcast previewing two new studies on "sextortion," a new form of remote sexual assault.
Office of the Director of National Intelligence General Counsel Robert Litt has published a new essay in The Yale Law Journal that will likely be of interest to Lawfare readers.
The hysteria over the Burr Feinstein law misses an opportunity for encryption advocates to gain genuine insight into how those on the other side of the issues think about workable regulatory regimes.
Today at 10 am, the House Energy and Commerce Committee will hold a hearing entitled "Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives."
Apple v. FBI is over, for now. But with exceptional access to data back in the headlines, we have a question for Apple in its role as an employer.
Senators Richard Burr and Dianne Feinstein release the Compliance with Court Orders Act of 2016.