Podcast Episode: Securing the Vote
U.S. democracy is at an inflection point, and how we administer and verify our elections is more important than ever. From hanging chads to glitchy touchscreens to partisan disinformation, too …
U.S. democracy is at an inflection point, and how we administer and verify our elections is more important than ever. From hanging chads to glitchy touchscreens to partisan disinformation, too …
2000 Mules is a movie which claims to expose election fraud with phone app location data. While these claims have already been thoroughly debunked, the movie also deserves condemnation for …
The Computer Fraud and Abuse Act (CFAA), the notoriously vague anti-hacking law, is long overdue for major reform. Among many problems, the CFAA has been used to target security researchers …
There is a lot to appreciate in the recently published “Notice of Funding Opportunity” (NOFO) by the Department of Commerce’s National Telecommunications Information Administration (NTIA). It is arguably the first …
The U.S. Intelligence Community (IC) has released its Annual Statistical Transparency Report disclosing the use of national security surveillance laws for the year 2021—and to no one’s surprise it documents …
Users Should Be Able to Choose Among Platforms With Different Moderation Policies WASHINGTON, D.C.—The Electronic Frontier Foundation (EFF) today urged the U.S. Supreme Court to halt enforcement of Texas’ constitutionally …
It often feels like machine learning experts are running around with a hammer, looking at everything as a potential nail – they have a system that does cool things and …
Egyptian blogger, coder, and free speech activist Alaa Abd El Fattah is on day 45 of a hunger strike in protest of his mistreatment in an Egyptian prison. Alaa was …
Latin American countries have a choice to make in the coming months—whether to accede to a new set of rules for coordinating and cooperating with each other and nations around …
Geofence and reverse keyword warrants are some of the most dangerous, civil-liberties-infringing and reviled tools in law enforcement agencies’ digital toolbox. It turns out that these warrants are so invasive …