|
You are here |
osaka.law.miami.edu | ||
| | | | |
supreme.justia.com
|
|
| | | | | Berger v. New York | |
| | | | |
www.eff.org
|
|
| | | | | UPDATE (4/22/13): The Cyber Intelligence Sharing and Protection Act (CISPA) has passed the House of Representatives with amendments. This FAQ reflects the bill prior to the amendments. We will be updating this post as we review the bill. In the meantime, please refer to the version of the bill (PDF... | |
| | | | |
www.schneier.com
|
|
| | | | | Back in June, when the contents of Edward Snowden's cache of NSA documents were just starting to be revealed and we learned about the NSA collecting phone metadata of every American, many people-including President Obama-discounted the seriousness of the NSA's actions by saying that it's just metadata. Lots and lots of people effectively demolished that trivialization, but the arguments are generally subtle and hard to convey quickly and simply. I have a more compact argument: metadata equals surveillance. Imagine you hired a detective to eavesdrop on someone. He might plant a bug in their office. He might tap their phone. He might open their mail. The result would be the details of that person's communications. That's the "data."... | |
| | | | |
www.openedr.com
|
|
| | | Endpoint Detection and Response (EDR), identify and respond to cyber threats instantly. Protect your endpoints using the EDR software tool from OpenEDRĀ® | ||