This WEEK in LAW

By Denise Howell | Possible TWiL discussion topics (http://twit.tv/twil)

A brief history of U.S. encryption policy

The FBI’s recent attempt to force Apple to unlock the iPhone of Syed Farook brought the battle over encryption directly to the pockets of many …

National Security Agency (NSA)

Google Shows Off Its Titan Security Key (TWiT Bits)

After bringing phishing attempts on its employees to a standstill by requiring YubiKeys, Google is launching its own Titan security key to the …

Ramifications of Trump revoking Obama’s cyber offense order

<i>With help from Eric Geller and Martin Matishak</i><p><b>WEAPONS FREE —</b> The Trump administration this week took a major step toward empowering the military to conduct more cyberattacks. President Donald Trump rescinded Presidential Policy Directive 20, an Obama-era document that required high-level …

Obama Administration

There is no such thing as a ‘safe backdoor’ in encryption

Most Americans don’t consider the significant role encryption plays in our everyday lives.<p>Want to send your text messages and emails privately? …

Encryption

Deposing Tim Cook

By Stewart Baker<p>To avoid helping the FBI search the San Bernardino terrorist’s phone, Apple and its CEO, Tim Cook, are going to spend weeks in court, and probably on Capitol Hill. That means that for the first time the government will have a chance to use subpoenas and discovery to judge the truth …

Tim Cook

The U.S. needs to think about the unthinkable on cybersecurity

By Stewart Baker<p><i>Stewart Baker is a Washington lawyer who served as general counsel of the National Security Agency from 1992 to 1994 and assistant secretary for policy at the Department of Homeland Security from 2005 to 2006.</i><p>The United States may have pioneered the idea of fighting wars in …

National Security Agency (NSA)

Download Skating on Stilts here

Hoover has agreed to release Skating on Stilts under a Creative Commons Attribution-NoDerivs License 3.0.<p>This means you can copy it as many times as …

Al-Qaeda

FBI repeatedly overstated encryption threat figures to Congress, public

By Devlin Barrett<p>Devlin Barrett<p>Reporter focusing on national security and law enforcement<p>Email Bio Follow<p>The FBI has repeatedly provided grossly inflated statistics to Congress and the public about the extent of problems posed by encrypted cellphones, claiming investigators were locked out of …

Mobile Devices

Hard Questions: Why Does Facebook Enable End-to-End Encryption?

<i>Hard Questions is a series from Facebook that addresses the impact of our products on society.</i><i>By Gail Kent, Global Public Policy Lead on Security</i> …

Encryption

Ex-Homeland Security official: FISA checks on known terror suspects are a matter of life and death

Video<p>ISIS takes credit for deadly NYC terror attack<p>You might be surprised to discover that the average college freshman doesn’t remember 9/11.<p>I was even more surprised to find that a lot of Congressmen don’t either.<p>That’s the only good explanation for their willingness to play chicken with one of …

As cyber-attacks on the US rise, is the answer to hack back?

Some cyber security experts want the US government, and even private companies and individuals, to go on the offensive.

Debate: Was Snowden Justified? Former NSA Counsel Stewart Baker vs. Whistleblower Daniel Ellsberg

<b>JUAN GONZÁLEZ:</b> Today, we host a debate on former National Security Agency contractor Edward Snowden and his disclosure of the massive spying …

Americans’ Privacy at Stake as Second Circuit Hears Hasbajrami FISA Case

When Congress reauthorized Section 702 of the Foreign Intelligence Surveillance Act (FISA) in January, it ratified the warrantless collection of …

Surveillance

What Happened at the Court: The Hasbajrami Oral Argument on Section 702 of FISA and the Fourth Amendment

On August 27, the U.S. Court of Appeals for the Second Circuit heard argument in <i>United States v. Hasbajrami</i>, a case that raises several challenges to …

Fourth Amendment

After Equifax's mega-breach, nothing changed

The Equifax data breach was supposed to change everything about cybersecurity regulation on Capitol Hill. One year later, it's not clear it changed …

Equifax

For safety’s sake, we must slow innovation in internet-connected things - MIT Technology Review

Smart gadgets are everywhere. The chances are you have them in your workplace, in your home, and perhaps on your wrist. According to an estimate from …

Cyber-attacks

Artificial Intelligence is greater concern than climate change or terrorism, says new head of British Science Association

Artificial Intelligence is a greater concern than antibiotic resistance, climate change or terrorism for the future of Britain, the incoming president of the British Science Association has warned.<p>Jim Al-Khalili, Professor of physics and public engagement at the University of Surrey, said the …

Artificial Intelligence

U.S. Silently Enters New Age of Cyberwarfare

Years ago, the world witnessed the creation of the first major “cyberweapon.” Secretly loaded onto an unknown Iranian worker’s USB flash drive, an …

Cannabis

Offensive Cyber Operations and the Interagency Process: What’s at Stake With the New Trump Policy

Yesterday the Wall Street Journal’s Dustin Volz reported that President Trump has altered the interagency process for vetting offensive cyber …

Armed Conflict

IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color

In the decade after the 9/11 attacks, the New York City Police Department moved to put millions of New Yorkers under constant watch. Warning of …

Analytics

European Parliament Passes Copyright Directive Giving Artists Greater Share of Revenue

The European Parliament passed a wide-ranging digital copyright directive Wednesday that will give film and TV writers, directors and performing …

European Parliament

What’s in the sweeping copyright bill just passed by the European Parliament

Legislation now goes to a three-way negotiation within the EU.<p>The European Parliament has approved a package of dramatic changes to copyright law …

European Parliament

Google, Facebook face massive fines over terror propaganda

The European Union is proposing massive fines for online providers that aren’t fast enough in removing terrorist content from their services, raising pressure on big tech firms like Facebook and Google that have backed voluntary approaches.<p>The bloc’s executive arm Wednesday proposed new legislation …

European Parliament

Europe Could Fine Tech Companies That Don't Remove Terrorist Content in One Hour

The European Union has made a litany of warnings to online platforms, urging them to better moderate their hellish platforms or else. But these have …

Cat hackers! Pets are caught red handed trying to 'hack' into laptops that are set to take a picture when the wrong password is entered three times

These adorable images seem to show that cats are getting into computer hacking.<p>A series of pictures shows felines caught red handed as they play …

Laptops

My laptop is set up to take a picture after 3 incorrect password attempts

University DDoS'd by its own seafood-curious malware-infected vending machines

2017's security headlines are starting to read like MadLibsA US university saw its network traffic slow to a crawl thanks to an IoT malware infection …

Stanford Journal of Blockchain Law & Policy

Stanford University

Archive.org's Wayback Machine is legit legal evidence, US appeals court judges rule

<b>Analysis</b> Big thumbs up to Internet Archive for nowThe Wayback Machine's archive of webpages is legitimate evidence that may be used in litigation, a …

Judiciary