Theft of private individuals’ information tends to be viewed as serious only when people suffer direct harm. But such theft can have much larger consequences.
Latest in Privacy: Technology
Manipulating images, sound, or video to convincingly mislead the public could take so-called “fake news” to a new level.
Small Towns, Big Companies: How Surveillance Intermediaries Affect Small and Midsize Law Enforcement Agencies
A summary of David Kris's new paper for the National Constitution Center's May 10 event on "Digital Privacy in the 21st Century."
Recent proposals to search the cellphones and social media profiles of visitors arriving at the U.S. border raise serious legal questions and are unwise from a policy perspective.
In a paper released today at a Brookings panel discussion, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.
The Second Circuit Court of Appeals ruled today that the Stored Communications Act "does not authorize courts to issue and enforce against U.S.-based service providers warrants for the seizure of customer e-mail content that is stored exclusively on foreign servers."
We’ve distilled some of the general problems associated with exceptional access systems into a short list of warning signs to look out for in any new proposal.
This morning, Benjamin Wittes hosted an online webcast previewing two new studies on "sextortion," a new form of remote sexual assault.
Office of the Director of National Intelligence General Counsel Robert Litt has published a new essay in The Yale Law Journal that will likely be of interest to Lawfare readers.