Filter by keyword: Filter by year:

Double-Helix Dilemma: The Unravelling of 23&Me

March 13, 2024

Some of us take a genetic test to find out if we are at risk for genetic diseases. Some of us do so

AI's Regulatory Challenge: Avoiding the Pitfalls of Past Mistakes

December 18, 2023

Artificial intelligence (AI) has returned to the forefront of public discourse, sparked by the AI Safety

Spyware Under the ICCPR

February 14, 2023

In 2011, the NSO Group introduced Pegasus into the market to “help[] government agencies prevent and investigate terrorism and crime to save thousands of lives

PIPL - China’s First Personal Information Regulation: How Do We Comply?

October 31, 2022

China’s first comprehensive online data and personal information regulation, Personal Information Privacy Law (PIPL), went into effect on

Privacy in the Era of Drone Surveillance

February 18, 2020

A report from Bard’s College for the Study of Drones shows that so far, 600 law enforcement agencies across the country use drones.[1]

The Fifth Amendment Implications of How You Unlock Your Phone

February 5, 2020

I recently bought a new laptop, one with a fingerprint sensor. I didn’t think much about this feature. My old laptop didn’t have

Surveillance Under the Mask of Identification

December 24, 2019

Surveillance Under the Mask of Identification

We may imagine any number of circumstances in which the government might need to know whether someone is who she

Scraping Together Best (Scraping) Practices: Is There an API for That?

November 12, 2019

Despite its evocative name, “web scraping” is just a blitz of electrical impulses zipping across fiber at approximately the speed of light. Not so easy

The Fight Against the Fake Call: The Rise of Spoofing and Robocalls

March 5, 2019

Your phone starts to vibrate. You don’t recognize the number, but it’s from your area code, so you decide to answer. On the other end

Lawful Hacking: A Temporary Solution to the “Going Dark” Challenge

February 26, 2019

The increased ubiquity and sophistication of encryption presents a serious problem for law enforcement. There has been a growing gap between law enforcement’s legal authority to