The Women Who Won Net Neutrality
Read more » about The Women Who Won Net NeutralityAuthor(s): Marvin AmmoriPublication Date: September 22, 2015Publication Type: Other Writing
View ArticleThese two apps immune to government spying, experts say
Date published: September 22, 2015"FaceTime and "possibly" WhatsApp are the only applications that prevent governments from accessing the contents of communication, a cybersecurity expert said on...
View ArticleHas White House finally got the message about strong encryption? Welcome...
Read more » about Has White House finally got the message about strong encryption? Welcome shift seen in speeches and policy memoAuthor(s): Geoffrey KingPublication Date: September 22, 2015Publication...
View ArticlePETA Files Lawsuit In SF Court To Give Monkey Ownership Of His Own Selfie Photos
Date published: September 22, 2015"Legal expert Andrew Bridges told CBS MoneyWatch said Slater isn’t the copyright owner because he didn’t have artistic control. “Copyright requires original creative...
View ArticleVolkswagen isn’t the first company to use software to break the law and it...
Date published: September 23, 2015"“Here’s an extreme example: What if Amazon’s robotic warehouses could reorganize themselves to meet fire code requirements with very little advance notice of an...
View ArticleWhy are working class kids less likely to get elite jobs? They study too hard...
Author(s): Henry FarrellPublication Date: September 23, 2015Publication Type: Other WritingLauren Rivera is an associate professor of management and organizations at Northwestern University’s Kellogg...
View ArticleFirst Amendment & Cyberlaw Scholars File Brief to Defend Open Internet Rules
On Monday, September 21st, fifteen of the nation's leading First Amendment and cyberlaw scholars -- including Jack Balkin (Yale), Yochai Benkler (Harvard), Theodore L. Glasser (Stanford), Larry Lessig...
View ArticleData and protecting the right to privacy
Cross-posted from the Knight Foundation. Video: Knight News Challenge: Data.Read more » about Data and protecting the right to privacyRelated Topics: Privacysurveillance
View ArticleSymposium: Living in Public: (Re)Negotiating Privacy + Security + Surveillance
Co-hosted and presented by The Tech Museum of Innovation and the San Jose Museum of Art. Read more » about Symposium: Living in Public: (Re)Negotiating Privacy + Security + SurveillanceOctober 3,...
View ArticleThis teen won’t go to prison, even after he hacked 50,700 computers
Date published: July 13, 2015"In the Finnish court, though, that's not an unusual punishment, said Andrea Matwyshyn, a professor at the Center for Information Technology Policy at Princeton...
View ArticleBackdoors, Spyware, and 'Going Dark'
The past week or two have been fascinating ones for those following cyber security news… Read more » about Backdoors, Spyware, and 'Going Dark'
View ArticleThe Iran deal reflects the U.S.’s overwhelming power over the world’s...
Author(s): Henry FarrellPublication Date: July 14, 2015Publication Type: Other WritingThere is good reason to believe that Iran was prepared to reach a deal over its nuclear program because it was...
View ArticleWe're going to have to change our laws to cope with robots
Date published: July 14, 2015""Technology has not stood still," he wrote in an article in the California Law Review journal."The same private institutions that developed the Internet, from the armed...
View ArticleOnline comment forums to continue despite ECHR ruling
Date published: July 14, 2015"According to some interpretations, the verdict indicates that the media are responsible for the comments posted by anonymous users. Such explanation is, however, not...
View ArticleLaw Must Catch Up with Rise of Robotics
Date published: July 15, 2015"A new article calls for the law to catch up with robotic technology. Ryan Calo, assistant professor in the University of Washington School of Law, says it’s time laws...
View ArticleThe FBI’s Problem Isn’t “Going Dark.” Its Problem is Going Slowly
Author(s): Marshall ErwinPublication Date: July 16, 2015Publication Type: Other WritingIt should be clear to even casual observers today that the “golden age of surveillance” thesis is fundamentally...
View ArticleFeds bust through huge Tor-hidden child porn site using questionable malware
Date published: July 16, 2015""The court filings scrupulously avoid naming Tor (or mentioning hacking). Instead, they provide a detailed description of an anonymizing ‘Network’ and how a particular...
View ArticleAnti-Flash sentiment sweeps the globe
On this week's show we'll be checking in with Richard Forno on the fallout from the OPM breach. Richard has been kicking around in DC infosec circles for a long time now and he let's us know what the...
View ArticleWhy the Islamic State leaves tech companies torn between free speech and...
Date published: July 16, 2015"“You want to live in a world where people have access to news — in other words, documentary evidence of what is actually happening,” said Andrew McLaughlin, a former...
View ArticleThe US's Campaign Against Encryption Is Based on Blind Faith in Silicon Valley
Date published: September 22, 2015""The unanimous conclusion—the scientific consensus—in industry, in academia, and even among government experts is that there is a significant security risk associated...
View Article