-
Yesterday, the Second Circuit released its long-awaited opinion in the Microsoft Ireland case, ruling that the DOJ cannot compel Microsoft to produce emails stored on its Irish servers, because to do so ...
-
The Second Circuit Court of Appeals ruled today in the case Microsoft v. United States, finding that Stored Communications Act "does not authorize courts to issue and enforce against U.S.-based service p...
-
National Security Council veterans Ari Schwartz and Rob Knake recently released a paper entitled Government’s Role in Vulnerability Disclosure. The paper, published by Harvard’s Belfer Center, catalogues...
-
The Indian Supreme Court has dismissed a public interest litigation petition (PIL) by Sudhir Yadav, a Right-To-Information activist and web developer who called for a ban on messaging apps that offer end...
-
Earlier this month, a number of federal employees were surprised by a letter they received in the mail: a letter from their professional liability insurance provider informing them that it, Wright USA, h...
-
Global conversations are often skewed in favor of the countries that generate data or possess the technological capability to access it. The encryption debate in countries with advanced technical capacit...
-
The current encryption debate is gridlocked. For the past year, privacy advocates, civil libertarians, Department of Justice attorneys, cryptographers, and others have been stonewalling one another, exch...
-
In a recent post, Bruce Schneier says that “CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist”, and suggests that Brennan is either lying or ignorant. Bruce cites, in full, the relev...
-
Almost four years ago, I wrote the following in a post on lone shooters:
-
Although we served as national security officials for Presidents from different parties, we stand united in our concern for the growing threat of a significant terrorist attack on our shores, due to the ...
-
Our guest for episode 119 is Kevin Kelly, founding executive editor of Wired Magazine and author of The Inevitable: Understanding the 12 Technological Forces that will Shape our Future. Kevin and I share...
-
Over the past fifteen years, an uneasy trans-Atlantic equilibrium between U.S. law enforcement and security agencies’ collection of personal information, sometimes on a bulk basis, and European privacy p...