The Security Burden Shouldn't Rest Solely on the Software User
October 31, 2013
The below is the final installment in a five-part series. Part 1 explored the problems stemming from our collective unwillingness to hold software providers accountable for vulnerability-ridden code. Part 2 argued that the technical challenges associ
We Need Strict Laws If We Want More Secure Software
October 30, 2013
This is the fourth installment in a series on whether and how to hold software makers financially liable for the insecurity of their products. Part I offered an overview of the problem of insecure code. Part II countered the notion that the technical
The NSA Doesn't Need Wholesale Reform, Just Greater Oversight
October 29, 2013
What should we do about the NSA? Should we do anything at all? These question are on the forefront these days.
History's Most Consequential Terrorism Trial Still Isn't Happening
October 28, 2013
So when will the 9/11 case go to trial, anyway?
I Did Not 'Recant' on Voter ID Laws
October 27, 2013
The federal judge ponders data, consequences, and a decision that enabled voter suppression
Two major human rights groups released reports this month that together provide much-needed texture to the debate on civilian casualties from U.S.
Two leading human rights NGOs, Amnesty International and Human Rights Watch, released separate reports on U.S. drone warfare this week. They were focused on different places geographically—Amnesty’s report, “Will I be next? U.S.
Maryville, Missouri Is a Lawless Hellhole
October 23, 2013
Small-towners are allowed to dis big cities, but not vice versa. The Maryville rape case should change that.
The Founding Fathers Vacillated on Government Snooping, Too
October 23, 2013
Americans today vacillate over national security and government power. We want an effective intelligence community, but we don’t want too much surveillance or collection.
What You Don't Know About Internet Security Will Definitely Hurt You
October 22, 2013
This is the third installment in a series on whether and how to hold software makers financially liable for the insecurity of their products. Part I offered an overview of the problem of insecure code; Part II countered the notion that the technical