[Podcast] NSA Cybersecurity Services for Defense Contractors
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
No Password Required: A Believer That the Key to Internet Safety Is Simple...
Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls
Do Legal Challenges to NSA's PRISM Program Stand a Chance? Yes.
Is Edward Snowden a Whistleblower?
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
Stewart Baker, Former GC of NSA, on Why the Cybersecurity Act Failed & Threat of Tomorrow’s Terrorism
In this month's edition, we examine the Swiss data protection authority's comments on the validity of its data-sharing framework with the U.S., as well as the European Data Protection Board's guidance on joint controllers and...more
On Monday, January 4, 2016, the U.S. government filed a motion in Klayman v. Obama to vacate the preliminary injunction granted by the U.S. District Court for the District of Columbia that limited the National Security...more
Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more
The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more
Fast approaching is the June 1 expiration of certain provisions of the Patriot Act, including § 215 (codified as 50 U.S.C § 1861), which is the basis for the National Security Agency’s (NSA) bulk telephone metadata collection...more
In yet another reminder of the importance of maintaining the privacy of personal information, the Second Circuit Court of Appeals, in ACLU v. Clapper, issued a unanimous decision striking down the National Security Agency’s...more
Whatever your opinion of Edward Snowden, the shockwaves from his leaks of classified material continue to roil all three branches of the federal government. The latest wave broke last week when the United States Court of...more
As post-Snowden America well knows, for some years now the National Security Agency (NSA) has been collecting bulk telephone metadata under the authority of Section 215 of the PATRIOT Act and aggregating it into data banks...more
Nearly two years ago, Edward Snowden, a contractor working with the U.S. National Security Agency (“NSA”), revealed startling details of widespread surveillance practices by the U.S. government into telephone and Internet...more
Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more
Recent revelations concerning the activities of the National Security Agency (“NSA”) include reports that the NSA and other government agencies have – in secret – routinely collected in bulk the “metadata” associated with...more
Today, President Obama delivered an address announcing reforms to the NSA's domestic surveillance programs. Following a deluge of leaks concerning the NSA's domestic operations, President Obama created an advisory panel to...more
It seems like a new revelation about mass surveillance by the U.S. government and our allies occurs on an almost daily basis, each one more astounding than the last. Don’t be surprised if those jingling bells you hear on your...more
In a 68-page opinion, Federal District Judge Richard J. Leon of the District of Columbia ruled yesterday in Klayman v. Obama that the NSA's systematic collection of telephone metadata of millions of citizens violates the...more
In 1891, Arthur Conan-Doyle wrote a Sherlock Holmes short story entitled “A Case of Identity”. In it, he solves a mystery in part by determining that several different letters were all typed on the same typewriter: "It...more