Recent Academic Papers and Reports of Interest

[An FDA for Algorithms](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2747994) (pdf; 29 pages; March 15, 2016) – Andrew Tuft

[The Fourth Amendment in the Information Age](http://www.yalelawjournal.org/forum/fourth-amendment-information-age) (April 27, 2016) – Robert Litt (General Counsel, Office of the Director of National Intelligence)

[The Fourth Amendment in the Coming Drone Age](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2763374) (pdf; 29 pages; December 3, 2015) – Brooke Hofhenke (American University – Washington College of Law)

[Norms of Computer Trespass](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2601707) (pdf; 42 pages; May 2, 2015) – Orin Kerr (The George Washington University Law School)

[Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web](http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2742706) (pdf; 45 pages; March 5, 2016) – Ahmed Ghappour (UC Hastings College of the Law)

[International Signals Intelligence Law: Provisions and History](https://lawfare.s3-us-west-2.amazonaws.com/staging/2016/International%20Signals%20Intelligence%20Law.pdf) (March 2016) – A.M. Rutkowski

[Inefficiently Automated Law Enforcement](http://digitalcommons.law.msu.edu/cgi/viewcontent.cgi?article=1149&context=lr) (pdf; 34 pages; May 4, 2016) – Woodrow Hartzog, Gregory Conti, John Nelson and Lisa A. Shay

[How Governments Can Promote Automated Driving](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2749375) (pdf; 46 pages; March 17, 2016) – Bryant Walker Smith (University of South Carolina – School of Law)

05/10/2016: 

Robots, AI and the Law (link round-up)

We Robot 2016 (http://robohub.org/considering-the-future-of-law-and-robotics-we-robot-2016-video-recap/) at Robohub.org (April 11, 2016) – all videos at the link:

> A. Moral Crumple Zones: Cautionary Tales in Human Robot Interaction (video duration 01:40:00)

> B. SmartPrivacy in Human-Robot Interaction (video duration 01:20:00)

> C. How to Engage the Public on the Ethics and Governance of Lethal Autonomous Weapons (video duration 01:03:00)

> D. Autonomous Vehicles (video duration 02:35:00)

> E. Privacy and Healthcare Robots (video duration 01:10:30)

> F. Institutional Options for Robot Governance (video duration 01:31:30)

> G. Will #BlackLivesMatter to RoboCop? (video duration 01:16:30)

> H. Siriously? Free Speech Rights for Artificial Intelligence (video duration 01:20:30)

> I. What Do We Really Know About Robots and the Law? (video duration 01:13:00)

Hearing on the “The Legal and Ethical Aspects of Robotics and Artificial Intelligence” – European Parliament Committee on Legal Affairs (April 21, 2016)

> [Hearing Agenda](https://polcms.secure.europarl.europa.eu/cmsdata/upload/981397b4-227c-479e-b1dd-45cbb343fec5/Draft%20Programme_Robotics_06.04.2016.pdf) (single page pdf)

> [Link](http://www.europarl.europa.eu/news/en/news-room/20160414IPR23196/Committee-on-Legal-Affairs-meeting-21042016-(PM)) to the recorded video of the hearing. The relevant portion begins at 00:54:30 (total length of hearing: approximately 2 hours, 21 minutes)

[Robots in American Law](https://www.strausscenter.org/events/event/444-robots-in-american-law) presentation by law professor Ryan Calo at the University of Texas Law School (March 22, 2016). Two videos: main presentation (video duration 01:08:00) and a conversation with Ryan Calo (video duration 00:15:00). See also: Robots in American Law – Ryan Calo (University of Washington Law School) ([pdf](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2737598##); 44 pages)

[What Is a Robot? The Question is More Complicated Than it Seems](http://www.theatlantic.com/technology/archive/2016/03/what-is-a-human/473166/) (March 22, 2016) – Adrienne Lafrance in The Atlantic

[Four Reasons America’s Laws Governing Robots Are Terrifyingly Outdated; Robots are Evolving Faster Than the Laws That Rule Their Existence](https://www.inverse.com/article/13428-4-reasons-america-s-laws-governing-robots-are-terrifyingly-outdated?utm_source=twitter.com&utm_medium=on_site&utm_campaign=desktop) (March 29, 2016) – Sarah Sloat in Inverse

[The Race Is On to Control Artificial Intelligence, and Tech’s Future](http://www.nytimes.com/2016/03/26/technology/the-race-is-on-to-control-artificial-intelligence-and-techs-future.html) (March 25, 2016) and [Silicon Valley Looks to Artificial Intelligence for the Next Big Thing](http://www.nytimes.com/2016/03/28/technology/silicon-valley-looks-to-artificial-intelligence-for-the-next-big-thing.html?partner=rss&emc=rss) (March 27, 2016) – New York Times. See also: [AI Hits the Mainstream](https://www.technologyreview.com/s/600986/ai-hits-the-mainstream/) (March 28, 2016) – MIT Technology Review

[Let Artificial Intelligence Evolve; That Way, It’ll Be Moral](http://www.slate.com/articles/technology/future_tense/2016/04/the_philosophical_argument_against_artificial_intelligence_killing_us_all.html?wpsrc=sh_all_mob_tw_top) (April 18, 2016) – Michael Chorost in Slate

[Robots Are Learning to Fake Empathy](http://motherboard.vice.com/en_uk/read/robots-are-learning-to-fake-empathy) (April 6, 2016) – MotherBoard

[What the Scarlett Johansson Robot Says About the Future; Courts Need to Grapple with New Questions Raised by Increasingly Technology-Savvy Fans](http://www.slate.com/articles/technology/future_tense/2016/04/what_the_scarlett_johansson_robot_says_about_the_future.html) (April 7, 2016) – Margot E. Kaminski in Slate

Flash Forward podcast: “[Rude Bot Rises](http://www.flashforwardpod.com/2016/04/05/episode-10-rude-bot-rises/)” on conscious artificial intelligence (podcast length: 00:30:45) (April 5, 2016)

[Humans Can’t Escape Killer Robots, but Humans Can Be Held Accountable for Them](https://news.vice.com/article/killer-robots-autonomous-weapons-systems-and-accountability?utm_source=vicenewstwitter) (April 15, 2016) – P.W. Singer and August Cole at ViceNews

[Terrifyingly Convenient; A.I. Assistants Can Give You the News, Order You a Pizza, and Tell You a Joke and All You Have To Do is Trust Them – Completely](http://www.slate.com/articles/technology/cover_story/2016/04/alexa_cortana_and_siri_aren_t_novelties_anymore_they_re_our_terrifyingly.html) (April 3, 2016) – Will Oremus in Slate

[Chat Bots, Conversation and AI as an Interface](http://ben-evans.com/benedictevans/2016/3/30/chat-bots-conversation-and-ai-as-an-interface) (March 30, 2016) – Benedict Evans

04/24/2016: 

Microsoft vs. the USA/DOJ

**The Complaint:** [pdf](http://online.wsj.com/public/resources/documents/microsoftcomplaint.pdf); 17 pages (April 14, 2016)

**Statement of Microsoft’s President and Chief Legal Officer (Brad Smith):** [Keeping Secrecy the Exception, Not the Rule: An Issue for Both Consumers and Businesses](http://blogs.microsoft.com/on-the-issues/2016/04/14/keeping-secrecy-exception-not-rule-issue-consumers-businesses/#sm.0000042ekhocn0ejow78nei304muu) (April 14, 2016)

**News Report:** [Microsoft Sues Justice Department to Protest Electronic Gag Order Statute](http://www.nytimes.com/2016/04/15/technology/microsoft-sues-us-over-orders-barring-it-from-revealing-surveillance.html?_r=1) (April 14, 2016) – New York Times

**Legal Analysis:**

[A New Lawsuit from Microsoft: No More Gag Orders!](https://www.justsecurity.org/30583/challenge-microsoft-gag-orders/) (April 14, 2016) – law professor Jennifer Daskal at JustSecurity

[Why Microsoft’s Fight with the Government Should Overshadow Apple’s – the Electronic Frontier Foundation and Two Law Professors Explain Its Significance](https://www.inverse.com/article/14348-why-microsoft-s-fight-with-the-government-should-overshadow-apple-s) (April 15, 2016) – Inverse

**Related:** [House Panel’s Bill Strengthens Privacy for Older Emails](http://www.nytimes.com/aponline/2016/04/13/us/politics/ap-us-congress-email-privacy.html) – New York Times

04/24/2016: 

Apple, the FBI and the All Writs Act (link round-up; updated 05.13.2016)

**DOJ/FBI Vacate San Bernardino iPhone Case:**

> [DOJ Motion to Vacate](https://cryptome.org/2016/03/usg-apple-209.pdf) (pdf; 3 pages) (March 28, 2016) and [Judge’s Order to Vacate](https://cryptome.org/2016/03/usg-apple-210.pdf) (pdf; 1 page) (March 29, 2016)

> [Apple and DOJ Statements](http://www.buzzfeed.com/sheerafrenkel/fbi-accessed-san-bernardino-shooters-iphone-without-apple-dr#.wuOqGVvkW) (March 28, 2016) – reproduced in a BuzzFeed article on the motion to vacate

> [U.S. Says It Has Unlocked iPhone Without Apple](http://mobile.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-department-case.html?emc=edit_th_20160329&nl=todaysheadlines&nlid=34482325&_r=0&referer=) (March 28, 2016) – New York Times

> [](https://twitter.com/JZdziarski/status/714586370216472580) “I guarantee you at some point, somebody told Director Comey, ‘good god, Jim, you’ve got to make this go away.'” – Jonathan Ździarski [(@JZdziarski)](https://twitter.com/JZdziarski): March 28, 2016

> Related: [U.S. Government Drops New York iPhone Case After Third Party Gives It the Passcode](http://www.dailydot.com/politics/doj-drops-new-york-iphone-order/) (April 23, 2016) – Daily Dot

**The San Bernardino iPhone Unlock:**

> [Nothing Significant Found on San Bernardino iPhone So Far](http://www.cbsnews.com/news/source-nothing-significant-found-on-san-bernardino-iphone/) (April 13, 2016) – CBS News

> [FBI Paid Professional Hackers One-Time Fee to Crack San Bernardino iPhone](https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html) (April 12, 2016) – Washington Post; and [Apple iPhone Unlocking Maneuver Likely to Remain Secret](http://www.reuters.com/article/us-apple-encryption-whitehouse-idUSKCN0XB05D) (April 14, 2016) – Reuters

> [F.B.I. Director Suggests Bill for iPhone Hacking Topped $1.3 Million](http://www.nytimes.com/2016/04/22/us/politics/fbi-director-suggests-bill-for-iphone-hacking-was-1-3-million.html) (April 21, 2016) – New York Times

> [FBI Says Method Used to Unlock iPhone Doesn’t Work with iPhone 5s or Newer](http://techcrunch.com/2016/04/07/fbi-says-method-used-to-unlock-iphone-doesnt-work-with-iphone-5s-or-newer/) (April 7, 2016) – TechCrunch

> [Apple Likely Can’t Force FBI to Disclose How It Got Data From Seized iPhone](http://arstechnica.com/tech-policy/2016/03/feds-mum-if-they-will-disclose-how-fbi-got-data-from-seized-iphone/) (March 28, 2016) – ArsTechnica; and the government’s [Vulnerabilities Equities Process](https://www.eff.org/document/vulnerabilities-equities-process-january-2016) (pdf at the link; 14 pages). See also: [Thank You for Hacking the iPhone, Now Tell Apple How You Did It](http://www.bloomberg.com/news/articles/2016-03-23/thank-you-for-hacking-iphone-now-tell-apple-how-you-did-it) (March 22, 2016) – BloombergBusiness weighing in on whether the FBI, if successful in getting into the San Bernardino iPhone, would be required to share with Apple the means it used.

**What’s Next?**

> [FBI’s Comey Expects More Litigation Over Access to Electronic Devices](http://www.reuters.com/article/us-usa-security-comey-idUSKCN0Y2273?feedType=RSS&feedName=domesticNews) (May 11, 2016) – Reuters

> Burr-Feinstein Draft Legislation – see my separate post [here](https://www.jrmchale.org/2016/04/burr-feinstein-anti-crypto-draft-legislation/)

> [A Possible Tool to Unlock the iPhone Means Something . . . or Nothing](https://www.lawfareblog.com/possible-tool-unlock-iphone-means-something…or-nothing) (March 22, 2016) – Susan Hennessy and Benjamin Wittes at LawFare:

>> “In the longer term, however, the episode changes nothing. It merely defers the important questions which we’re eventually going to have to resolve, either in the courts or in Congress or both:

>> • Does the All Writs Act apply to compel this type of assistance from an information service provider like Apple, or is such an order precluded by CALEA?

>> • If the All Writs Act does properly apply, what constitutes an undue burden under the controlling test in New York Telephone Company?

>> • Is there an obligation for the government to seek assistance from other federal agencies and the commercial sector before demonstrating that non-party assistance is required as a matter of necessity under the All Writs Act?

>> • More generally, what obligations do we want companies like Apple to have to cooperate with and assist law enforcement in the investigation and prosecution of their users?”

> I would add to the Hennessy/Wittes list of questions to be resolved: if the All Writs Act does properly apply in order to compel assistance from a company such as Apple, how might the constitution (primarily, though not exclusively, the first amendment) limit the type and extent of assistance to law enforcement a court could require?

> [Repetitive Encryption Tirades Could Be Giving Way to Debate Over ‘Lawful Hacking’](https://theintercept.com/2016/04/20/repetitive-encryption-tirades-could-be-giving-way-to-debate-over-lawful-hacking/) (April 20, 2016) – The Intercept

> [The Encryption Debate Enters Phase Two](https://www.lawfareblog.com/encryption-debate-enters-phase-two) (March 16, 2016) – Daniel Weitzner (Director of the MIT Internet Policy Research Initiative and Principal Research Scientist at the MIT Computer Science and Artificial Intelligence Lab) in LawFare; and [A New Front in the Second Crypto War](https://www.lawfareblog.com/new-front-second-crypto-war) (March 15, 2016) – the generally pro-FBI/IC and often provocative Benjamin Wittes in LawFare; two important reads on what might come next regarding encryption – law and policy

> [WhatsApp Encryption Said to Stymie Wiretap Order](http://mobile.nytimes.com/2016/03/13/us/politics/whatsapp-encryption-said-to-stymie-wiretap-order.html?referer=&_r=0) (March 12, 2016) – New York Times

> [Why Do the Feds Usually Try to Unlock Phones? It’s Drugs, Not Terrorism](http://www.wired.com/2016/03/feds-usually-try-unlock-phones-drugs-not-terrorism/) (March 31, 2016) – Wired; and [Measuring the ‘Darkness’ of ‘Going Dark’ – Just How Dark is Law Enforcement Going?](https://medium.com/niskanen-center/measuring-the-darkness-of-going-dark-7a41585d06a8#.zgt8biqda) (April 4, 2016) – Ryan Hagemann of the Niskanen Center with a similar point regarding the typical governmental reason to seek decryption (i.e., the drug war)

**Court Orders, Filings and Schedules:**

> Magistrate Judge Sheri Pym’s February 16, 2016 [Order](https://regmedia.co.uk/2016/02/17/apple_order.pdf) ([alternate link](https://assets.documentcloud.org/documents/2714001/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf))

> DOJ [Motion to Compel Apple Compliance](http://www.wired.com/wp-content/uploads/2016/02/Apple-iPhone-access-MOTION-TO-COMPEL.pdf) (pdf; 35 pages)(February 19, 2016)

> Apple’s [Motion to Vacate Order Compelling Apple to Assist Agents in Search, and Opposition to Government’s Motion to Compel Assistance](https://cryptome.org/2016/02/usg-apple-016.pdf) (link is to pdf hosted at cryptome.org; the motion is approximately 36 pages without supporting documents and 415 pages with supporting documents) (alternate link to the motion without supporting documents at the New York Times: [Apple’s Motion Opposing the iPhone Order](http://www.nytimes.com/interactive/2016/02/25/technology/document-apple-motion-opposing-iphone-order.html) and alternate link to the motion without supporting documents at [DocumentCloud](http://www.documentcloud.org/documents/2722199-5-15-MJ-00451-SP-USA-v-Black-Lexus-IS300.html)) (February 25, 2016) – My quick initial reaction before seeing the upcoming DOJ response: If the magistrate judge is inclined to get out of the mess created by her initial order, there appear to be adequate grounds to do so based solely on Apple’s All Writs Act arguments, without getting to the constitutional question (primarily 1st Amendment)

> [Apple Files Motion to Vacate the Court Order to Force it to Unlock iPhone](http://techcrunch.com/2016/02/25/apple-files-motion-to-dismiss-the-court-order-to-force-it-to-unlock-iphone-citing-free-speech-rights/) (February 25, 2016) – TechCrunch

> [Apple Files Appeal in San Bernardino iPhone Case](http://www.politico.com/blogs/under-the-radar/2016/03/apple-files-appeal-in-san-bernardino-iphone-case-220109) (March 2, 2016) – Politico

> DOJ [Reply Brief](https://cryptome.org/2016/03/usg-apple-149.pdf) (March 10, 2016) (pdf, hosted at cryptome; 484 pages with supporting documents; main portion of filing = first 43 pages)

> [The Tone between Apple and the FBI is Now Openly Hostile](http://www.theverge.com/2016/3/10/11196548/apple-accuses-department-of-justice-fbi-smearing-desperation); includes transcript of the reaction to the DOJ filing of Bruce Sewell, Apple’s general counsel and SVP of legal (March 10, 2016) – Verge

> Apple [Response](https://assets.documentcloud.org/documents/2762131/C-D-Cal-16-Cm-00010-Dckt-000177-000-Filed-2016.pdf) to Latest DOJ Filing (March 15, 2016) (pdf; 33 pages without all supporting documents; [alternative link](https://cryptome.org/2016/03/usg-apple-177.pdf) to pdf (351 pages) hosted at cryptome.org with the supporting documents)

> [Apple’s Response To DOJ: Your Filing Is Full Of Blatantly Misleading Claims And Outright Falsehoods](https://www.techdirt.com/articles/20160315/15505433916/apples-response-to-doj-your-filing-is-full-blatantly-misleading-claims-outright-falsehoods.shtml) (March 15, 2016) – TechDirt

> [Amicus Briefs and Letters to Court in Support of Apple](https://www.apple.com/pr/library/2016/03/03Amicus-Briefs-in-Support-of-Apple.html) – Apple website

> Pro-FBI/DOJ Amicus Briefs: [California State Sheriffs, Police Chiefs and Peace Officers Associations](http://static.politico.com/bc/b7/ba076e084d1d968ef8626a5b5de0/california-police-associations-amicus-brief.pdf), [San Bernardino County DA](http://static.politico.com/94/dc/446127354efb8b15f90eeab37d51/san-bernardino-da-amicus-brief.pdf), [Federal Law Enforcement Officers Association](https://cryptome.org/2016/03/usg-apple-025-049.pdf) (pdf is included within the collection of amicus briefs at the link), and [the relatives of several San Bernardino shooting victims](https://cdn1.vox-cdn.com/uploads/chorus_asset/file/6141821/survivor-amicus.0.pdf) (March 3, 2016)

> Schedule Re: Magistrate Judge’s Order – Arguments set for March 22, 2016 (link to judge’s scheduling order, including briefing schedule, [here](http://www.buzzfeed.com/nicolasmedinamora/government-demands-apple-unlock-san-bernardino-attackers-iph#.fpxnlxOEZ))

> [Magistrate Judge, at the request of the DOJ, Vacates the March 22nd Hearing](https://assets.documentcloud.org/documents/2773542/031123152171.pdf) (pdf; 3 pages) (March 21, 2016) – in order to allow the DOJ/FBI time to ascertain if a method of unlocking the San Bernardino terrorist iPhone, that was suggested by a ‘third party’ on March 20, 2016, in fact works. Also: [Court Reporter’s Transcript](https://cryptome.org/2016/03/usg-apple-transcript-16-0321.pdf) (pdf; 12 pages) of the Oral Hearing on Monday, March 21, 2016 regarding the motion to vacate the March 22nd hearing. DOJ committed to filing a status update by April 5, 2016. The Magistrate Judge’s original order to compel Apple was stayed.

> [DOJ Motion to Vacate](https://cryptome.org/2016/03/usg-apple-209.pdf) (pdf; 3 pages) (March 28, 2016) and [Judge’s Order to Vacate](https://cryptome.org/2016/03/usg-apple-210.pdf) (pdf; 1 page) (March 29, 2016)

**Legal Analysis:**

> [A Coherent Middle Ground in the Apple-FBI All Writs Act Dispute](https://www.lawfareblog.com/coherent-middle-ground-apple-fbi-all-writs-act-dispute) (March 21, 2016) – law professors Robert Chesney and Steve Vladeck at LawFare; and [A friendly critique of the proposed Chesney/Vladeck ‘middle ground’ in the Apple/FBI disputes](https://www.justsecurity.org/30113/friendly-critique-proposed-chesneyvladeck-middle-ground-applefbi-disputes/) (March 21, 2016) – law professor Marty Lederman at JustSecurity

> [The Convoluted Logic Behind Apple’s ‘Obstruction’ of Law Enforcement](http://motherboard.vice.com/read/doj-seeks-to-overturn-new-york-iphone-case) (March 8, 2016) – Sarah Jeong at MotherBoard

> [A Primer on Apple’s Brief in the San Bernadino iPhone Fight](https://www.lawfareblog.com/primer-apples-brief-san-bernadino-iphone-fight) (February 26, 2016) – law professor Robert Chesney at LawFare

> [Really Understanding Apple’s Legal Brief in the FBI Case](http://www.theverge.com/2016/2/26/11120760/apple-vs-fbi-legal-brief-explained) (February 26, 2016) – Nilay Patel in Verge

> [The Law is Clear: The FBI Cannot Make Apple Rewrite its OS](https://backchannel.com/the-law-is-clear-the-fbi-cannot-make-apple-rewrite-its-os-9ae60c3bbc7b#.6hf6y46vf) (March 16, 2016) – Susan Crawford at Backchannel

> [Apple’s iPhone Blunder](http://www.hoover.org/research/apples-iphone-blunder) (February 22, 2016) – Law professor Richard Epstein

> [Apple’s Strongest Legal Defenses Against the FBI](http://motherboard.vice.com/en_ca/read/apple-legal-defense-against-fbi-phone-unlock-san-bernardino) (February 24, 2016) – Jason Koebler at MotherBoard

> Preliminary Thoughts on the Apple iPhone Order in the San Bernardino Case [(Part 1)](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/02/18/preliminary-thoughts-on-the-apple-iphone-order-in-the-san-bernardino-case-part-1/) and [(Part 2): the All Writs Act](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/02/19/preliminary-thoughts-on-the-apple-iphone-order-in-the-san-bernardino-case-part-2-the-all-writs-act/) and [(Part 3): the Policy Question](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/02/24/preliminary-thoughts-on-the-apple-iphone-order-in-the-san-bernardino-case-part-3-the-policy-question/) (February 18, 19 and 24, 2016) – Orin Kerr in the Washington Post

> [The Weak Main Argument in Judge Orenstein’s Apple Opinion](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/03/02/the-weak-main-argument-in-judge-orensteins-apple-opinion/) (March 2, 2016) – Orin Kerr in the Washington Post

> [Trust, Apple, and the First Amendment](https://www.lawfareblog.com/trust-apple-and-first-amendment) (February 23, 2016) – Law professor Andrew Keane Woods at LawFare

> [Apple’s ‘Code = Speech’ Mistake](https://www.technologyreview.com/s/600916/apples-code-speech-mistake/) (March 1, 2016) – law professor Neil Richards in MIT Technology Review; and [Apple-FBI Fight Asks: Is Code Protected as Free Speech?](http://www.bloomberg.com/news/articles/2016-02-24/apple-fbi-fight-asks-is-code-protected-as-free-speech) (February 23, 2016) – Bloomberg; and [Apple’s First Amendment Case Against the FBI](http://motherboard.vice.com/read/fbis-case-against-apple-could-violate-free-speech) (February 19, 2016) – Jason Koebler at MotherBoard

> [Why the Fourth Amendment Should Be Part of the Apple Case](http://prawfsblawg.blogs.com/prawfsblawg/2016/02/why-isnt-the-fourth-amendment-part-of-the-apple-case.html) (February 29, 2016) – law professor Richard Re

> [CALEA Limits the All Writs Act and Protects the Security of Apple’s Phones](https://cyberlaw.stanford.edu/blog/2016/02/calea-limits-all-writs-act-and-protects-security-apples-phones) and [More CALEA and Why It Trumps the FBI’s All Writs Act Order](https://cyberlaw.stanford.edu/blog/2016/02/more-calea-and-why-it-trumps-fbis-all-writs-act-order#.VssxYk0kskI.twitter) (February 19 and 22, 2016) – Albert Gidari, Director of Privacy at Stanford’s CIS

> [DOJ Misleads Court on CALEA in the Apple Case](https://cyberlaw.stanford.edu/blog/2016/03/doj-misleads-court-calea-apple-case#.VuL2DSyVAps.twitter) (March 11, 2016) – Albert Gidari at Stanford CIS

> [Apple, the FBI, and the All Writs Act](http://www.dorfonlaw.org/2016/02/apple-fbi-and-all-writs-act.html) (February 19, 2016) – Michael Dorf at Dorf on Law

**The Public Relations Battle:**

> [The Behind-the-Scenes Fight Between Apple and the FBI](http://www.bloomberg.com/news/features/2016-03-20/the-behind-the-scenes-fight-between-apple-and-the-fbi) (March 20, 2016) – Bloomberg

> [Full Transcript of TIME’s Interview With Apple CEO Tim Cook](http://time.com/4261796/tim-cook-transcript/) (March 17, 2016) – Time

> [Apple Encryption Engineers, if Ordered to Unlock iPhone, Might Resist](http://www.nytimes.com/2016/03/18/technology/apple-encryption-engineers-if-ordered-to-unlock-iphone-might-resist.html?smid=tw-nytimesbusiness&smtyp=cur&_r=0) (March 17, 2016) – New York Times. While I understand the sentiment, this strikes me as the kind of thing that might annoy the magistrate judge.

> [Video](https://www.youtube.com/watch?v=FhFibpHSJFE) of President Obama speaking at SXSW on the FBI vs. Apple dispute (relevant portion: 01:16:00 to 01:27:35).

>> [](https://twitter.com/KevinBankston/status/708409661272096768)   “Shorter Obama at #SXSW on crypto: we need tech community to figure out a compromise that allows lawful access. (There, saved u 10 minutes.)” – Kevin Bankston [(@KevinBankston)](https://twitter.com/KevinBankston): March 11, 2016

>> [Obama Wants Nonexistent Middle Ground on Encryption; Warns Against ‘Fetishizing Our Phones’](https://theintercept.com/2016/03/11/obama-wants-nonexistent-middle-ground-on-encryption-warns-against-fetishizing-our-phones/) (March 11, 2016) – The Intercept

>> [President Obama Is Wrong On Encryption; Claims The Realist View Is ‘Absolutist’](https://www.techdirt.com/articles/20160311/16433333876/president-obama-is-wrong-encryption-claims-realist-view-is-absolutist.shtml) (March 11, 2016) – TechDirt

> [Apple and U.S. Bitterly Turn Up Volume in iPhone Privacy Fight](http://mobile.nytimes.com/2016/03/11/technology/apple-iphone-fight-justice-department.html?emc=edit_tu_20160311&nl=bits&nlid=34482325&referer=&_r=0) (March 10, 2016) – New York Times

> [Who’s for Apple and Who’s for the FBI: The Full List](http://fortune.com/2016/03/04/apple-fbi-friends-of-court/) (March 4, 2016) – Fortune

> [Video](http://judiciary.house.gov/index.cfm/hearings?ID=89431275-E911-4D5C-BD70-BFE3EF91AD86) of the House Judiciary Committee hearing on “The Encryption Tightrope: Balancing Americans’ Security and Privacy” (March 1, 2016)

> [The Apple-FBI Encryption Hearing Was Unexpectedly Hostile to the FBI Director](http://motherboard.vice.com/read/the-apple-fbi-encryption-hearing-judiciary-committee-fbi-director-james-comey) (March 1, 2016) – Motherboard

> Testimony of Susan Landau, Professor of Cybersecurity Policy Worcester Polytechnic Institute for House Judiciary Committee Hearing on ‘The Encryption Tightrope: Balancing Americans’ Security and Privacy’ (March 1, 2016) ([pdf](http://judiciary.house.gov/_cache/files/b3af6e9e-b599-4216-b2f9-1aee6a1d90cd/landau-written-testimony.pdf); 25 pages); See also: Bruce Sewell’s (Apple General Counsel and SVP) statement for the committee ([pdf](https://www.documentcloud.org/documents/2726483.html#document/p1); 3 pages)

> Apple’s [Dear Customer Letter](http://www.apple.com/customer-letter/) (February 16, 2016)

> Apple’s FAQ for Customers: [Answers to Your Questions about Apple and Security](http://www.apple.com/customer-letter/answers/); related: [Demystifying Apple’s FAQ – a Rebuttal](https://www.lawfareblog.com/demystifying-apples-faq-–-rebuttal) (February 29, 2016) – Blair Reeves at LawFare

> Apple’s Internal Employee Letter: [In Employee Email, Apple CEO Tim Cook Calls For Commission On Interaction Of Technology And Intelligence Gathering](http://techcrunch.com/2016/02/22/in-employee-email-apple-ceo-tim-cook-calls-for-commission-on-interaction-of-technology-and-intelligence-gathering/) (February 22, 2016; full text of employee email at the link)

> [Tim Cook’s Full 30-minute Interview on Apple’s Fight with the FBI; Apple’s CEO Says Federal Authorities are ‘Trampling Civil Liberties’](http://www.theverge.com/2016/2/24/11110802/apple-tim-cook-full-interview-fbi-iphone-encryption) (February 24, 2016) – full ABC News interview available at Verge

> [The FBI Wants to Roll Back Safeguards that Keep Us a Step Ahead of Criminals](https://www.washingtonpost.com/opinions/apple-vp-the-fbi-wants-to-roll-back-safeguards-that-keep-us-a-step-ahead-of-criminals/2016/03/06/cceb0622-e3d1-11e5-a6f3-21ccdbc5f74e_story.html) (March 6, 2016) – Apple SVP Craig Federighi op-ed in the Washington Post

> FBI Director Comey’s Statement (published at LawFare): [We Could Not Look the Survivors in the Eye if We Did Not Follow this Lead](https://www.lawfareblog.com/we-could-not-look-survivors-eye-if-we-did-not-follow-lead) (February 21, 2016)

> [Pro-Encryption Lawmakers See ‘Apple vs. FBI’ Fight as a Chance to Educate Congress](http://www.dailydot.com/politics/apple-fbi-iphone-encryption-backdoors-congress-ron-wyden-zoe-lofgren/) (February 23, 2016) – DailyDot

> [In the Apple Case, a Debate Over Data Hits Home](http://mobile.nytimes.com/2016/03/14/technology/in-the-apple-case-a-debate-over-data-hits-home.html?_r=1&referer=https://t.co/BzSHdStJkZ) (March 13, 2016) – New York Times

**Intelligence Community Viewpoint:**

> [On Encryption Battle, Apple Has Advocates in Ex-National Security Officials](http://www.nytimes.com/2016/04/23/business/on-encryption-battle-apple-has-advocates-in-ex-national-security-officials.html?smid=tw-share&_r=0) (April 22, 2016) – New York Times

> [Encryption, Privacy Are Larger Issues Than Fighting Terrorism, Clarke Says](http://www.npr.org/2016/03/14/470347719/encryption-and-privacy-are-larger-issues-than-fighting-terrorism-clarke-says?utm_campaign=storyshare&utm_source=twitter.com&utm_medium=social) (March 14, 2016) – NPR

> [Why the NSA is Staying Out of Apple’s Fight with the FBI](http://www.theverge.com/2016/3/9/11186868/apple-fbi-nsa-encryption-exploit-hack) (March 9, 2016) – Russell Brandon of The Verge on what is a very interesting question. See also [NSA Is Mysteriously Absent From FBI-Apple Fight](https://theintercept.com/2016/03/03/nsa-is-mysteriously-absent-from-fbi-apple-fight/) (March 3, 2016) – The Intercept

**Technical Aspects:**

> [Apple Policy on Bugs May Explain Why Hackers Would Help F.B.I.](http://mobile.nytimes.com/2016/03/23/technology/apple-policy-on-bugs-may-explain-why-hackers-might-help-fbi.html?partner=rss&emc=rss&referer=) (March 22, 2016) – New York Times

> [My Take on FBI’s ‘Alternative’ Method](http://www.zdziarski.com/blog/?p=5966#more-5966) (March 21, 2016) – Jonathan Zdziarski

> [One of the FBI’s Major Claims in the iPhone Case is Fraudulent](https://www.aclu.org/blog/free-future/one-fbis-major-claims-iphone-case-fraudulent) (March 7, 2016) – Daniel Kahn Gillmor, Technology Fellow, ACLU Speech, Privacy, and Technology Project

> [In Apple vs. the FBI, There is No Technical Middle Ground](https://www.technologyreview.com/s/600923/in-apple-vs-the-fbi-there-is-no-technical-middle-ground/) (March 2, 2016) – MIT Technology Review

> [A Bomb on a Leash](http://www.zdziarski.com/blog/?p=5924#more-5924) + [Apple Should Own The Term ‘Warrant Proof’](http://www.zdziarski.com/blog/?p=5912) + [An Example of ‘Warrant Friendly’ Security](http://www.zdziarski.com/blog/?p=5900#more-5900) + [Mistakes in the San Bernardino Case](http://www.zdziarski.com/blog/?p=5834) (all March 11, 2016 except for the last, which is March 2, 2016 and updated on March 9th) – Jonathan Zdziarski

> [Members Of Congress Dismayed By FBI Director’s Lack Of Tech Knowledge](http://www.fastcompany.com/3057768/source-members-of-congress-dismayed-by-fbi-directors-lack-of-tech-knowledge) (March 12, 2016) – Fast Company

> [San Bernardino iPhone Technically Can Be Hacked Without Apple, Researchers Say](http://abcnews.go.com/US/san-bernardino-iphone-technically-hacked-apple-researchers/story?id=37065676) (February 21, 2016) – ABC News

> [Who Needs Apple When the FBI Could Hack Terrorist iPhone Itself](http://www.bloomberg.com/news/articles/2016-03-04/who-needs-apple-when-the-fbi-could-hack-terrorist-iphone-itself) (March 4, 2016) – Bloomberg

> [Common Software Would Have Unlocked San Bernardino Shooter’s iPhone](http://www.cbsnews.com/news/common-software-would-have-unlocked-san-bernardino-shooters-iphone/) (February 21, 2016) – CBS News

> [Code is Law](http://www.zdziarski.com/blog/?p=5642) and [The Burden of Forensic Methodology on Apple](http://www.zdziarski.com/blog/?p=5645#more-5645) and [On FBI’s Interference with iCloud Backups](http://www.zdziarski.com/blog/?p=5695) and [On Ribbons and Ribbon Cutters](http://www.zdziarski.com/blog/?p=5714) (February 17, 18, 21 and 23, 2016) – Jonathan Zdziarski

> [Apple Is Said to Be Trying to Make It Harder to Hack iPhones](http://www.nytimes.com/2016/02/25/technology/apple-is-said-to-be-working-on-an-iphone-even-it-cant-hack.html?smid=tw-bna&_r=0) (February 24, 2016) – New York Times

> [Johns Hopkins Researchers Poke a Hole in Apple’s Encryption](https://www.washingtonpost.com/world/national-security/johns-hopkins-researchers-discovered-encryption-flaw-in-apples-imessage/2016/03/20/a323f9a0-eca7-11e5-a6f3-21ccdbc5f74e_story.html) (March 21, 2016) – Washington Post

> [How Did Governments Lose Control of Encryption?](http://www.bbc.com/news/technology-35659152) (March 2, 2016) – BBC

> The Ground Truth About Encryption and the Consequences of Extraordinary Access – Chertoff Group report ([pdf](http://www.chertoffgroup.com/cms-assets/documents/238024-282765.groundtruth.pdf); 28 pages)

> [On the San Bernardino Suspect’s Apple ID Password Reset](http://daringfireball.net/2016/02/san_bernardino_password_reset) (February 21, 2016) – Daring Fireball

> [Apple Says the Government Bungled Its Chance to Get That iPhone’s Data](http://www.wired.com/2016/02/apple-says-the-government-bungled-its-chance-to-hack-that-iphone/) (February 19, 2016) – Kim Zetter in Wired

> [On FBI’s Interference with iCloud Backups](http://www.zdziarski.com/blog/?p=5695) (February 21, 2016) – Jonathan Zdziarski

> [FBI Rebuts Reports that County Reset San Bernardino Shooter’s iCloud Password without Consent](http://www.latimes.com/local/lanow/la-me-ln-fbi–terror-suspect-s-iphone-20160220-story.html) (February 20, 2016) – Los Angeles Times

> [Apple’s iOS Security Guide on Passcodes and the Secure Enclave](http://daringfireball.net/linked/2016/02/17/ios-security-guide) (February 17, 2016) – Daring Fireball

> [Apple Can Comply with the FBI Court Order](http://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/) (February 17, 2016) – Dan Guido at Trail of Bits Blog

> [A Technical Perspective on the Apple iPhone Case](https://www.eff.org/deeplinks/2016/02/technical-perspective-apple-iphone-case) (February 19, 2016) – EFF

> [Some Notes on Apple Decryption of San Bernardino Phone](http://blog.erratasec.com/2016/02/some-notes-on-apple-decryption-san.html) (February 16, 2016) – Errata Security

> [No, Apple Has Not Unlocked 70 iPhones For Law Enforcement](http://techcrunch.com/2016/02/18/no-apple-has-not-unlocked-70-iphones-for-law-enforcement/) (February 18, 2016) – Matthew Panzarino

> [Most Software Already has a ‘Golden Key’ Backdoor: the System Update](http://arstechnica.com/security/2016/02/most-software-already-has-a-golden-key-backdoor-its-called-auto-update/) (February 27, 2016) – ArsTechnica

**MSM Initial News Reports:**

> [Apple Fights Order to Unlock San Bernardino Gunman’s iPhone](http://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html) (February 17, 2016) – New York Times

> [Apple Vows to Resist FBI Demand to Crack iPhone Linked to San Bernardino Attacks](https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html) (February 17, 2016) – Washington Post

**Background – Events Leading up to FBI’s Action:**

> [US Government Pushed Tech Firms to Hand Over Source Code](http://www.zdnet.com/article/us-government-pushed-tech-firms-to-hand-over-source-code/) (March 17, 2016) – ZDNet

> [Secret Memo Details U.S.’s Broader Strategy to Crack Phones](http://www.bloomberg.com/news/articles/2016-02-19/secret-memo-details-u-s-s-broader-strategy-to-crack-phones) (February 19, 2016) – Bloomberg

> [Apple’s Line in the Sand Was Over a Year in the Making](http://www.nytimes.com/2016/02/19/technology/a-yearlong-road-to-a-standoff-with-the-fbi.html?_r=0) (February 18, 2016) – New York Times

> [How Tim Cook, in iPhone Battle, Became a Bulwark for Digital Privacy](http://www.nytimes.com/2016/02/19/technology/how-tim-cook-became-a-bulwark-for-digital-privacy.html?_r=0) (February 18, 2016) – New York Times

> [Inside the FBI’s Encryption Battle with Apple](http://www.theguardian.com/technology/2016/feb/17/inside-the-fbis-encryption-battle-with-apple) (February 18, 2016) – Guardian

> [Apple vs. FBI: ‘Just This Once’?](https://www.justsecurity.org/29453/apple-vs-fbi-just-once/) (February 23, 2016) – Julian Sanchez at JustSecurity

> [The List Of 12 Other Cases Where The DOJ Has Demanded Apple Help It Hack Into iPhones](https://www.techdirt.com/articles/20160223/07015733683/list-12-other-cases-where-doj-has-demanded-apple-help-it-hack-into-iphones.shtml) (February 23, 2016) – TechDirt

> [Why the Government Can’t Actually Stop Terrorists From Using Encryption](https://www.washingtonpost.com/news/the-switch/wp/2016/03/15/why-the-government-cant-actually-stop-terrorists-from-using-encryption/) (March 15, 2016) – Washington Post

**Background – the All Writs Act:**

> [Text](https://www.law.cornell.edu/uscode/text/28/1651) of the All Writs Act (28 U.S. Code § 1651) in its entirety:

>> (a) The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.

>> (b) An alternative writ or rule nisi may be issued by a justice or judge of a court which has jurisdiction.

> Wikipedia [entry](https://en.wikipedia.org/wiki/All_Writs_Act), including a useful audio summary by Jonathan Mayer of the All Writs Act (see the audio link on the Wikipedia page)

> [The Centuries-Old Law the Government Wants to Use to Unlock a Terrorist’s iPhone](https://www.washingtonpost.com/news/the-switch/wp/2016/02/17/the-centuries-old-law-the-government-wants-to-use-to-unlock-a-terrorists-iphone/) (February 17, 2016) – Washington Post

> [The Obscure 1789 Statute That Could Force Apple to Unlock a Smartphone](http://motherboard.vice.com/read/writs-and-giggles) (October 13, 2015) – Sarah Jeong at MotherBoard

> [The Dangerous All Writs Act Precedent in the Apple Encryption Case](http://www.newyorker.com/news/amy-davidson/a-dangerous-all-writ-precedent-in-the-apple-case?utm_content=buffer703f9&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer) (February 19, 2016) – New Yorker

**Background – Selected Noteworthy All Writs Act Cases:**

> [United States v. New York Telephone Co.](https://scholar.google.com/scholar_case?case=2167177984150747977&q=%2228+U.S.C.+§+1651%22&hl=en&as_sdt=6,33), 434 U.S. 159 (1977)

> [Price v. Johnston, Warden](https://scholar.google.com/scholar_case?case=8145731021014747017&q=%2228+U.S.C.+§+1651%22&hl=en&as_sdt=100ffffffffffffe04), 334 U.S. 266 (1948)

> [Pennsylvania Bureau of Corrections v. United States Marshals Service](https://scholar.google.ca/scholar_case?case=9932283031886059336&q=474+U.S.+34&hl=en&as_sdt=2003), 474 U.S. 34 (1985)

**Background – Recent DOJ Use of the All Writs Act:**

> [This Map Shows How the Apple-FBI Fight Was About Much More Than One Phone](https://www.aclu.org/blog/speak-freely/map-shows-how-apple-fbi-fight-was-about-much-more-one-phone) (March 30, 2016) – ACLU

> [Department of Justice Drops Brooklyn iPhone Case](http://www.sfchronicle.com/business/article/Department-of-Justice-drops-Brooklyn-iPhone-case-7304841.php?t=8e9812321e7d4f3860&cmpid=twitter-premium) (April 22, 2016) – San Francisco Chronicle; and [U.S. Government Drops New York iPhone Case After Third Party Gives It the Passcode](http://www.dailydot.com/politics/doj-drops-new-york-iphone-order/) (April 23, 2016) – Daily Dot

> [Justice Department Asks Judge to Revisit NY iPhone Case](http://www.reuters.com/article/uk-apple-encryption-idUSKCN0W92HZ) (March 7, 2016) – Reuters

>> [pdf](https://www.justsecurity.org/wp-content/uploads/2016/03/DOJ.appeal.orenstein.AWA_.pdf) (51 pages) of the DOJ’s March 7, 2016 appeal to the United States District Court (Eastern District of New York) from Magistrate Orenstein’s [rejection](https://epic.org/amicus/crypto/apple/Orenstein-Order-Apple-iPhone-02292016.pdf) (pdf; 50 pages) of the Apple New York All Writs Act order. The appeal will be considered by Judge Margo Brodie.

> [Apple Wins Major Court Victory in a Case Similar to San Bernardino](https://theintercept.com/2016/02/29/apple-wins-major-court-victory-in-its-battle-against-fbi-in-a-case-similar-to-san-bernardino/) (February 29, 2016) – The Intercept

> Judge Orenstein’s [Order](https://epic.org/amicus/crypto/apple/Orenstein-Order-Apple-iPhone-02292016.pdf) (pdf; 50 pages) (alternate links: [here](https://cdn1.vox-cdn.com/uploads/chorus_asset/file/6124209/Orenstein-Order-Apple-iPhone-02292016.0.pdf) and [here](https://www.justsecurity.org/wp-content/uploads/2016/02/orenstein.order_.pdf))

> [The Weak Main Argument in Judge Orenstein’s Apple Opinion](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/03/02/the-weak-main-argument-in-judge-orensteins-apple-opinion/) (March 2, 2016) – Orin Kerr in the Washington Post

> [Apple v. FBI Primer #2: On Judge Orenstein’s Ruling in the Queens Meth Case](https://www.lawfareblog.com/apple-v-fbi-primer-2-judge-orensteins-ruling-queens-meth-case) (March 1, 2016) – law professor Robert Chesney at LawFare

> [Magistrate Judge Orenstein’s Order in the EDNY, Denying DOJ’s All Writs Act Request](https://www.justsecurity.org/29599/magistrate-judge-orensteins-order-denying-dojs-writs-act-request/) (February 29, 2016) – law professor Marty Lederman at JustSecurity

> [DOJ Claims Apple Should Be Forced To Decrypt iPhones Because Apple, Not Customers, ‘Own’ iOS](https://www.techdirt.com/articles/20151024/04573732612/doj-claims-apple-should-be-forced-to-decrypt-iphones-because-it-customers-only-license-operating-system.shtml) (October 26, 2015) – TechDirt

> [The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions](https://www.justsecurity.org/27109/writs-act-software-licenses-judges-questions/) (October 26, 2015) – Jennifer Granick and Riana Pfefferkorn at JustSecurity

**Some Academic Papers of Potential Relevance:**

> 1st Amendment: [Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution](http://scholarship.law.upenn.edu/penn_law_review/vol143/iss3/3/) – A. Michael Froomkin (1995)

> 4th Amendment: [Furtive Encryption: Power, Trust, and the Constitutional Cost of Collective Surveillance](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2550934) – Jeffrey Vagle (2015); and related: [Why the Fourth Amendment Should Be Part of the Apple Case](http://prawfsblawg.blogs.com/prawfsblawg/2016/02/why-isnt-the-fourth-amendment-part-of-the-apple-case.html) – law professor Richard Re

**Background – Crypto Wars 1.0, 2.0 and Backdoors:**

> [Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications](http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6) (pdf; 34 pages) – MIT Computer Science and Artificial Intelligence Laboratory Technical Report (July 6, 2015)

> [Encryption: Selected Legal Issues](http://www.fas.org/sgp/crs/misc/R44407.pdf) (pdf; 29 pages)(March 3, 2016) – Richard M. Thompson II and Chris Jaikaran of the Congressional Research Service; and [Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations](http://www.fas.org/sgp/crs/misc/R44187.pdf) (pdf; 12 pages) – Kristin Finklea of the Congressional Research Service

> [Keeping Secrets: Four Decades Ago, University Researchers Figured out the Key to Computer Privacy, Sparking a Battle with the National Security Agency that Continues Today.](https://medium.com/stanford-select/keeping-secrets-84a7697bf89f) (November 7, 2014) – Henry Corrigan-Gibbs (Stanford Magazine)

> [Encryption and Globalization](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1960602) – a 2011 academic paper (Columbia Science and Technology Law Review, Vol. 23, 2012) by Peter Swire and Kenesa Ahmad, which includes a brief summary of the original 90’s “Crypto Wars”

> [A History of Backdoors](http://blog.cryptographyengineering.com/2015/07/a-history-of-backdoors.html) and [How Do We Build Encryption Backdoors?](http://blog.cryptographyengineering.com/2015/04/how-do-we-build-encryption-backdors.html) (July 20, 2015 and April 16, 2015) – Professor Matthew Green (Johns Hopkins) at his A Few Thoughts on Cryptographic Engineering blog

> “Don’t Panic – Making Progress on the ‘Going Dark’ Debate” – Berkman Center Report (overview [here](https://cyber.law.harvard.edu/pubrelease/dont-panic/); the [Report pdf here](https://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf) (37 pages, including notes and appendices)) (February 1, 2016)

> [Why Are We Fighting the Crypto Wars Again?](https://backchannel.com/why-are-we-fighting-the-crypto-wars-again-b5310a423295#.o45io2vi3) (March 11, 2016) – Steven Levy at Backchannel

**Tech Industry Reaction:**

> [Apple Gets Tech Industry Backing in iPhone Dispute, Despite Misgivings](http://www.nytimes.com/2016/03/03/technology/tech-rallies-to-apples-defense-but-not-without-some-hand-wringing.html?_r=0) (March 2, 2016) – New York Times; and [Solidarity With Apple Masks Unease In Silicon Valley About Legal Fight Over Dead Terrorist’s iPhone](http://www.ibtimes.com/solidarity-apple-masks-unease-silicon-valley-about-legal-fight-over-dead-terrorists-2323887) (February 29, 2016) – International Business Times

> [Amicus Briefs and Letters to Court in Support of Apple](https://www.apple.com/pr/library/2016/03/03Amicus-Briefs-in-Support-of-Apple.html) – Apple website

> [Statement](http://reformgs.tumblr.com/post/139513553507/reform-government-surveillance-statement) of Reform Government Surveillance coalition (including AOL, Apple, Dropbox, Evernote, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo)(February 17, 2016)

**Analysis and Opinion – Pro-FBI:**

> [NSA Isn’t the Going Dark Solution, Part I: Richard Clarke Gets It Wrong](https://www.lawfareblog.com/nsa-isnt-going-dark-solution-part-i-richard-clarke-gets-it-wrong) (March 24, 2016), [NSA Isn’t the Going Dark Solution, Part II: There’s No Such Thing As Magic](https://www.lawfareblog.com/nsa-isnt-going-dark-solution-part-ii-theres-no-such-thing-magic) (March 25, 2016), [NSA Isn’t the Going Dark Solution, Part III: “Beat Me If You Can”](https://www.lawfareblog.com/nsa-isnt-going-dark-solution-part-iii-beat-me-if-you-can) (March 25, 2016), and [The Very Definition of Digital Age Chutzpah](https://www.lawfareblog.com/very-definition-digital-age-chutzpah) (March 23, 2016) – LawFare (Susan Hennessy, except for the last, written by Benjamin Wittes)

> [Apple is Selling You a Phone, Not Civil Liberties](https://www.lawfareblog.com/apple-selling-you-phone-not-civil-liberties) (February 18, 2016) – Susan Hennessy and Benjamin Wittes at LawFare; and previously (February 3, 2016) at LawFare by Susan Hennessy: [Apple’s Going Dark Doublespeak](https://www.lawfareblog.com/apples-going-dark-doublespeak)

> [Apple’s iPhone Blunder](http://www.hoover.org/research/apples-iphone-blunder) (February 22, 2016) – Law professor Richard Epstein

> [Questions for Apple](https://www.lawfareblog.com/questions-apple) (March 1, 2016) – Susan Hennessy and Benjamin Wittes at LawFare

> [Apple’s Crocodile Tears](http://www.techpolicy.com/Blog/Featured-Blog-Post/Apple-s-Crocodile-Tears.aspx) (March 2, 2016) – law professor Omri Ben-Shaham at TAP

> [Apple’s Rotten Core; CEO Tim Cook’s Case for Not Aiding the FBI’s Anti-Terror Effort Looks Worse Than Ever](http://www.wsj.com/articles/apples-rotten-core-1456696736) (February 28, 2016), and [Tim Cook’s Bad Apple
Refusing to Cooperate with the FBI is About Protecting the Brand, Not iPhone Users](http://www.wsj.com/articles/tim-cooks-bad-apple-1456096265) (February 21, 2016) – Gordon Crovitz in the Wall Street Journal (subscription required)

> [Who Does Apple Think It Is?](http://www.usatoday.com/story/money/columnist/wolff/2016/02/18/wolff-who-does-apple-think/80565156/?hootPostID=df73cfeaf6c810ca9dbcbeb3432e6133) (February 20, 2016) – Michael Wolff in USA Today

> [Why Apple’s iPhone Battle with the Government will Likely be a Privacy Setback](https://www.washingtonpost.com/news/innovations/wp/2016/02/18/why-apples-iphone-battle-with-the-government-will-likely-be-a-privacy-setback/) (February 18, 2016) – Vivek Wadhwa in The Washington Post

> [](https://twitter.com/stewartbaker/status/701762524660760576)   “The war on terror can’t be a war on one of world’s great religions. Jim Comey must give a speech calling Apple a religion of peace.” – Stewart Baker [(@stewartbaker)](https://twitter.com/stewartbaker): February 22, 2016

**The China Question and Other International Ramifications:**

> [Apple Refused China Request for Source Code in Last Two Years](http://www.reuters.com/article/us-apple-encryption-idUSKCN0XG28Z) (April 20, 2016) – Reuters

> [A View of ISIS’s Evolution in New Details of Paris Attacks](http://www.nytimes.com/2016/03/20/world/europe/a-view-of-isiss-evolution-in-new-details-of-paris-attacks.html?_r=0) (March 19, 2016) – New York Times on the operational security (e.g., use of burner phones rather than encrypted iPhones) of the Paris attackers

> [UK Surveillance Powers Bill Could Force Startups to Bake in Backdoors](http://techcrunch.com/2016/03/10/uk-surveillance-powers-bill-could-force-startups-to-bake-in-backdoors/) (March 10, 2016) – TechCrunch

> [Feds Fire Back on San Bernardino iPhone, Noting that Apple has Accommodated China](http://arstechnica.com/tech-policy/2016/03/feds-fire-back-on-san-bernardino-iphone-noting-that-apple-has-accommodated-china/) (March 10, 2016) – ArsTechnica

> [The World’s Not Waiting for California: France Moves to Enforce Decryption](https://www.lawfareblog.com/worlds-not-waiting-california-france-moves-enforce-decryption) (March 7, 2016) – Daniel Severson at LawFare; and [France Clears Bill That Could Force Apple to Unlock Terror Data](http://www.bloomberg.com/news/articles/2016-03-08/france-votes-on-bill-that-could-make-apple-unlock-terrorist-data) (March 8, 2016) – Bloomberg News reporting on the lower house of the French Parliament clearing the proposed bill (which still has a ways to go before it could become law)

> [British Spy Agency Chief Says Tech Companies Should Provide a Way Around Encryption](https://www.technologyreview.com/s/600960/british-spy-agency-chief-says-tech-companies-should-provide-a-way-around-encryption/) (March 8, 2016) – MIT Technology Review

> [Deposing Tim Cook](http://feedproxy.google.com/~r/volokh/mainfeed/~3/BgDYZuTgcxM/story01.htm) (February 25, 2016) – Stewart Baker in the Washington Post posing questions to Apple about the extent of its cooperation with Chinese authorities

> [Apple in China, Part I: What Does Beijing Actually Ask of Technology Companies?](https://www.lawfareblog.com/apple-china-part-i-what-does-beijing-actually-ask-technology-companies) (February 22, 2016) – Samm Sacks at LawFare

> [Apple is Reportedly Giving the Chinese Government Access to its Devices for ‘Security Checks’](http://qz.com/332059/apple-is-reportedly-giving-the-chinese-government-access-to-its-devices-for-a-security-assessment/) (February 23, 2015) – Quartz

**Other Analysis and Opinion – Largely Pro-Apple:**

> [Some For-the-Moment Final Thoughts on Apple, Encryption and the FBI](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/04/07/some-for-the-moment-final-thoughts-on-apple-encryption-and-the-fbi/) (April 7, 2016) – David Post in the Washington Post

> [John Oliver Explains Why Apple Needs Encryption to Stay a Step Ahead of Hackers](http://www.theverge.com/2016/3/14/11218688/john-oliver-apple-fbi-encryption) (March 14, 2016) – video embed (18 minutes) at The Verge

> [](https://twitter.com/SwiftOnSecurity/status/708082792991567872)   “Reminder: Farook destroyed his + wife’s personal phones. There isn’t jack on his work iPhone. He didn’t even bother to hit it with a hammer.” – SecuriTay [(@SwiftOnSecurity)](https://twitter.com/SwiftOnSecurity): March 10, 2016

> [The Feds Are Wrong to Warn of ‘Warrant-Proof’ Phones](https://www.technologyreview.com/s/601044/the-feds-are-wrong-to-warn-of-warrant-proof-phones/) (March 17, 2016) – professor Woodrow Hartzog in the MIT Technology Review

> [Why This iPhone?- One Thing Getting Lost in the Apple-FBI Debate: It Doesn’t Seem Likely that the Device in Question will Yield any Critical Information](http://www.slate.com/articles/technology/future_tense/2016/02/the_apple_fbi_encryption_battle_is_over_an_iphone_unlikely_to_yield_critical.single.html) (February 19, 2016) – Marcy Wheeler in Slate

> [Apple, FBI, and Software Transparency](https://freedom-to-tinker.com/blog/bford/apple-fbi-and-software-transparency/) (March 10, 2016) – Bryan Ford at Freedom to Tinker

> [Apple Is Right on Encryption; the FBI Doesn’t Want Merely One Phone, and Its Warrant is Legally Suspect](http://www.wsj.com/article_email/apple-is-right-on-encryption-1456877827-lMyQjAxMTE2NzAzMjQwNzI3Wj) (March 1, 2016) – Wall Street Journal Editorial Board

> [The Apple Case Will Grope Its Way Into Your Future](http://www.nytimes.com/2016/02/25/technology/personaltech/the-apple-case-will-grope-its-way-into-your-future.html?_r=0) (February 24, 2016) – Farhad Manjoo in the New York Times

> [Why Apple Is Fighting Not To Unlock iPhones For The Government](http://techcrunch.com/2016/02/17/why-apple-is-fighting-not-to-unlock-iphones-for-the-government/) (February 17, 2016) – Matthew Panzarino at TechCrunch

> [How to Destroy Pandora’s iPhone](https://www.lawfareblog.com/how-destroy-pandoras-iphone) (February 26, 2016) – Nicholas Weaver at LawFare

> [Apple’s FBI Battle is Complicated; Here’s What’s Really Going On](http://www.wired.com/2016/02/apples-fbi-battle-is-complicated-heres-whats-really-going-on/) (February 18, 2016) – Kim Zetter at Wired

> [Feeble Noise Pollution; FBI, Apple, Liberty, Security, blah blah blah](https://medium.com/@thegrugq/feeble-noise-pollution-627acb5931a2#.4wx252eca) (February 19, 2016) – the Grugq

> [Dissecting And Dismantling The Myths Of The DOJ’s Motion To Compel Apple To Build A Backdoor](https://www.techdirt.com/articles/20160219/15165433654/dissecting-dismantling-myths-dojs-motion-to-compel-apple-to-build-backdoor.shtml) (February 19, 2016) – TechDirt

> [On Preventing the Widespread Use of a Law-Enforcement-Friendly iOS Patch](https://www.lawfareblog.com/preventing-widespread-use-law-enforcement-friendly-ios-patch) and [Apple and FBI: PIN Codes to Update Firmware, Code as Free Speech, and Legislative Clarification](https://www.lawfareblog.com/apple-and-fbi-pin-codes-update-firmware-code-free-speech-legislative-clarification) (February 25 and 26, 2016) – Herb Lin at LawFare

> [Decrypting an iPhone for the FBI](https://www.schneier.com/blog/archives/2016/02/decrypting_an_i.html?utm_source=twitterfeed&utm_medium=twitter) (February 22, 2016) – Bruce Schneier

> [The iPhone Writ Large](http://blogs.harvard.edu/infolaw/2016/02/19/the-iphone-writ-large/) (February 19, 2016) – Derek Bambauer at Info/Law

> [Obama Administration, FBI Must Act to Restore US Government’s Credibility in Apple’s Encryption Debate](http://iphone.appleinsider.com/articles/16/02/25/obama-administration-fbi-must-act-to-restore-us-governments-credibility-in-apples-encryption-debate) (February 25, 2016) – AppleInsider on what it deems the FBI’s disingenuous positioning (e.g., it’s not about precedent) in the San Bernardino case

> [The Conscription of Apple’s Software Engineers](http://www.theatlantic.com/politics/archive/2016/02/the-conscription-of-apples-software-engineers/463338/) (February 18, 2016) – Conor Friedersdorf in The Atlantic

> [Apple, the FBI, and the San Bernadino iPhone](https://freedom-to-tinker.com/blog/dwallach/apple-the-fbi-and-the-san-bernadino-iphone/) (February 17, 2016) – Dan Wallach at Freedom to Tinker

> [Not a Slippery Slope, but a Jump off the Cliff](https://lawfareblog.com/not-slippery-slope-jump-cliff) (February 17, 2016) – Nicholas Weaver at LawFare

> [Why the FBI’s Request to Apple Will Affect Civil Rights for a Generation](http://www.macworld.com/article/3034355/ios/why-the-fbis-request-to-apple-will-affect-civil-rights-for-a-generation.html) (February 17, 2016) – Rich Mogull at MacWorld

> [The FBI is Striking at the Heart of Apple’s Security System; the Entire industry has Followed the iPhone’s Security Model – What Happens if it Breaks?](http://www.theverge.com/2016/2/17/11035296/apple-iphone-encryption-fight-security-fbi) (February 17, 2016) – The Verge

> [Why Tim Cook is Wrong: A Privacy Advocate’s View;
Apple Should be Unable to Comply with this Request](http://www.theregister.co.uk/2016/02/17/why_tim_cook_is_wrong_a_privacy_advocates_view/) (February 17, 2016) – Trevor Potts

03/17/2016: 

Recommended:

> #### Law, Tech and Policy

> [Broadband Consumer Privacy Proposal Fact Sheet](https://www.fcc.gov/document/broadband-consumer-privacy-proposal-fact-sheet) (March 10, 2016) – FCC release (3 page pdf at the link)

>> [It’s Your Data: Empowering Consumers to Protect Online Privacy](http://www.huffingtonpost.com/tom-wheeler/its-your-data-protect-online-privacy_b_9428484.html) (March 10, 2016) – FCC Chairman Tom Wheeler at the Huffington Post;

>> [5 Things You Should Know About the FCC’s Proposed Privacy Rules](https://www.propublica.org/article/5-things-you-should-know-about-the-fccs-proposed-privacy-rules) (March 14, 2016) – ProPublica;

>> [The Feds Are Prepping Strict Rules to Protect Your Online Privacy](http://www.wired.com/2016/03/fcc-preparing-strongest-privacy-rules-ever/) (March 14, 2016) – Wired

>> [What ISPs Can See; Clarifying the Technical Landscape of the Broadband Privacy Debate](https://www.teamupturn.com/reports/2016/what-isps-can-see) (March 2016) – Upturn report

>> [The Dragonslayer – a Year Ago, FCC Chairman Tom Wheeler Saved the Internet; in this Exclusive Interview, He Tells Us What’s Next](http://www.theverge.com/2016/3/9/11181450/fcc-chairman-tom-wheeler-interview-5g-internet-net-neutrality) – Nilay Patel at Verge

> [Obama Administration Set to Expand Sharing of Data That N.S.A. Intercepts](http://www.nytimes.com/2016/02/26/us/politics/obama-administration-set-to-expand-sharing-of-data-that-nsa-intercepts.html?_r=1) (February 25, 2016) – New York Times; and [Surprise! NSA Data Will Soon Routinely Be Used For Domestic Policing That Has Nothing To Do With Terrorism]() (March 10, 2016) – Radley Balko in the Washington Post; and [FBI Quietly Changes its Privacy Rules for Accessing NSA Data on Americans](http://www.theguardian.com/us-news/2016/mar/08/fbi-changes-privacy-rules-accessing-nsa-prism-data) (March 8, 2016) – Guardian

> [Why the OPM Hack Is Far Worse Than You Imagine](https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine) (March 11, 2016) – Michael Adams at LawFare

> [It Took a FOIA Lawsuit to Uncover How the Obama Administration Killed FOIA Reform](https://news.vice.com/article/it-took-a-foia-lawsuit-to-uncover-how-the-obama-administration-killed-foia-reform) (March 9, 2016) – Vice; and [More Transparent Than Thou](https://www.justsecurity.org/29972/transparent-thou/) (March 15, 2016) – Brett Max Kaufman of the ACLU at JustSecurity

> [Time to Rethink Mandatory Password Changes](https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes) (March 2, 2016) – Lorrie Cranor (FTC Chief Technologist) at FTC blog; also [Two-Factor Authentication (2FA) versus Two-Step Verification (2SV); What’s the Difference and Which is Better?](https://www.grahamcluley.com/2016/03/factor-authentication-2fa-versus-step-verification-2sv/) (March 14, 2016) – David Bisson at grahamcluley.com

> [The Beginning of the End for Encryption Schemes? New Quantum Computer, Based on Five Atoms, Factors Numbers in a Scalable Way](http://news.mit.edu/2016/quantum-computer-end-encryption-schemes-0303) (March 3, 2016) – MIT

> Academic Paper: [Policing Hoover’s Ghost: The Privilege for Law Enforcement Techniques](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2740075) (download pdf at the link; 34 pages) (March 1, 2016) – professor Stephen W. Smith

> [Intel Whistle-Blowers Fear Government Won’t Protect Them](http://www.bloombergview.com/articles/2016-03-08/intel-whistle-blowers-fear-government-won-t-protect-them?utm_campaign=trueAnthem:+Trending+Content&utm_content=56e0569204d301434ed20967&utm_medium=trueAnthem&utm_source=twitter) (March 8, 2016) – Eli Lake at BloombergView

> [Taking Baby Steps Toward Software That Reasons Like Humans](http://www.nytimes.com/2016/03/07/technology/taking-baby-steps-toward-software-that-reasons-like-humans.html) (March 6, 2016) – New York Times

> [Biometrics are Coming, Along with Serious Security Concerns](http://www.wired.com/2016/03/biometrics-coming-along-serious-security-concerns/) (March 9, 2016) – Wired

> [Hunting What’s Next in High Tech](http://a16z.com/2016/03/11/ideas-trends/) (March 11, 2016) – Saku Panditharatne at a16z

> #### General Interest

> [Mathematicians Discover Prime Conspiracy](https://www.quantamagazine.org/20160313-mathematicians-discover-prime-conspiracy/) (March 13, 2016) – Quanta; and [Mathematicians Are Geeking Out About a Bizarre Discovery in Prime Numbers](http://qz.com/639452/mathematicians-are-geeking-out-about-a-bizarre-discovery-in-prime-numbers/?utm_content=buffer428da&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer) (March 15, 2016) – Quartz

> [Can You Keep a Secret? Former C.I.A. Chief Michael Hayden on Torture and Transparency](http://www.newyorker.com/magazine/2016/03/07/michael-hayden-comes-out-of-the-shadows) (March 7, 2016) – New Yorker

03/16/2016: 

Quote of the Day

> “[B]ecause the cost of saving all this data is so cheap, there’s no reason not to save as much as possible, and save it all forever. Figuring out what isn’t worth saving is hard. And because someday the companies might figure out how to turn the data into money, until recently there was absolutely no downside to saving everything. That changed this past year. What all these data breaches are teaching us is that data is a toxic asset and saving it is dangerous . . . . . We can be smarter than this. We need to regulate what corporations can do with our data at every stage: collection, storage, use, resale and disposal. We can make corporate executives personally liable so they know there’s a downside to taking chances. We can make the business models that involve massively surveilling people the less compelling ones, simply by making certain business practices illegal.”

— Bruce Schneier: [Data is a Toxic Asset](https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html?utm_content=buffer99c4c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer) at his website [Schneier on Security](https://www.schneier.com). Read the whole thing.

03/7/2016: 

Recommended:

> #### Law, Tech and Policy

> **Snooper’s Charter:** Revised [‘Investigatory Powers Bill’](https://www.gov.uk/government/collections/investigatory-powers-bill) introduced by the British government: [text of bill](http://services.parliament.uk/bills/2015-16/investigatorypowers.html), [codes of practice](https://www.gov.uk/government/publications/investigatory-powers-bill-codes-of-practice), and [additional documents](https://www.gov.uk/government/publications/investigatory-powers-bill-overarching-documents)

> **Privacy Shield:** [Restoring Trust in Transatlantic Data Flows Through Strong Safeguards: European Commission Presents EU-U.S. Privacy Shield](http://europa.eu/rapid/press-release_IP-16-433_en.htm) – European Commission press release with links to the various related documents; see also [E.U. and U.S. Release Details on Trans-Atlantic Data Transfer Deal](http://www.nytimes.com/2016/03/01/technology/eu-us-trans-atlantic-data-transfer-deal.html?partner=rss&emc=rss&_r=1) – New York Times

> **Fight Against Terrorism:** [Inside The Obama Administration’s Attempt To Bring Tech Companies Into The Fight Against ISIS](http://www.buzzfeed.com/sheerafrenkel/inside-the-obama-administrations-attempt-to-bring-tech-compa#.vdXbBXYB4) – BuzzFeed

> **Encryption:** [A Worldwide Survey of Encryption Products](https://cyber.law.harvard.edu/publications/2016/encryption_survey) – Berkman Center Research Publication (Bruce Schneier, Kathleen Seidel, and Saranya Vijayakumar) (pdf at this [link](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2731160); 24 pages)

> **CyberWarfare and Hacking:**

>> [These Are the Cyberweapons Used to Hack Sony](http://motherboard.vice.com/blog/sony-hack-cyberweapons-report) – MotherBoard

>> [U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict](http://www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html) – New York Times

> **New Chinese Media Restrictions:** [Beijing is Banning all Foreign Media from Publishing Online in China](http://qz.com/620076/beijing-is-banning-all-foreign-media-from-publishing-online-in-china/) – Quartz

> **Facebook Free Basics:** [Nothing Is Free, Not Even Facebook Free Basics](http://om.co/2016/02/08/nothing-is-free-not-even-facebook-free-basics/) – Om Malik; see also [India Just Banned Facebook’s Controversial Free Internet Plan](http://www.buzzfeed.com/nitashatiku/india-ruling-trai-free-basics#.vmPLyRVyW) – BuzzFeed

> **FISA Amendments Act:** [Trends and Predictions in Foreign Intelligence Surveillance: The FISA Amendments Act and Beyond](https://www.lawfareblog.com/trends-and-predictions-foreign-intelligence-surveillance-faa-and-beyond) – David Kris at LawFare

> **NSA Reorganization:** [National Security Agency Plans Major Reorganization](https://www.washingtonpost.com/world/national-security/national-security-agency-plans-major-reorganization/2016/02/02/2a66555e-c960-11e5-a7b2-5a2f824b02c9_story.html) – Washington Post; related: [Opinion: How NSA Reorganization Could Squander Remaining Trust](http://m.csmonitor.com/World/Passcode/Passcode-Voices/2016/0204/Opinion-How-NSA-reorganization-could-squander-remaining-trust) – Jason Healey at CSM’s Passcode; and [NSA Reorganizing](https://www.schneier.com/blog/archives/2016/02/nsa_reorganizin.html) – Bruce Schneier; and [Good Defense is Good Offense: NSA Myths and the Merger](https://www.lawfareblog.com/good-defense-good-offense-nsa-myths-and-merger) – Susan Hennessey at LawFare

> **Internet Law:** [Surveying Ten Years Of Top Internet Law Developments ](http://blog.ericgoldman.org/archives/2016/02/surveying-ten-years-of-top-internet-law-developments-forbes-cross-post.htm) – law professor Eric Goldman at his Technology & Marketing Law Blog

> **Future Computing and Emerging Technologies:**

>> [What’s Next in Computing?](https://medium.com/@cdixon/what-s-next-in-computing-e54b870b80cc#.z6hscijjq) (February 21, 2016) – venture capitalist Chris Dixon

>> [Ten Breakthrough Technologies: 2016](https://www.technologyreview.com/lists/technologies/2016/) – MIT Technology Review

> **Copyright Reform:** [White Paper on Remixes, First Sale, and Statutory Damages](http://www.uspto.gov/sites/default/files/documents/copyrightwhitepaper.pdf) (pdf; 117 pages) – Commerce Department’s internet policy task force; see also: [Repairing Damages: The Commerce Department’s Copyright White Paper](https://cdt.org/blog/repairing-damages-the-commerce-departments-copyright-white-paper/) – CDT

> **Startups:**

>> [Tech Policy for Startups](https://cdt.org/campaign/tech-policy-for-startups/) – CDT’s suite of resources on tech policy for start-ups and entrepreneurs

>> [Fixing the Inequity of Startup Equity](https://data.triplebyte.com/fixing-the-inequity-of-startup-equity-469793baad1e#.xlbjz7kh0) – TripleByte

> #### General Interest

> [Stop Paying Executives for Performance](https://hbr.org/2016/02/stop-paying-executives-for-performance) – Dan Cable and Freek Vermeulen in the Harvard Business Review

> [This Former Ad Agency CEO Says the Ad Industry Has Three Major Delusions Holding It Back](http://www.businessinsider.com/bob-hoffmans-three-ad-delusions-2016-3?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+typepad%2Falleyinsider%2Fsilicon_alley_insider+%28Silicon+Alley+Insider%29) – Business Insider

> [The Law of Banksy: Who Owns Street Art?](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711789) (pdf; 36 pages) – Peter Salib in the University of Chicago Law Review (Vol. 83, No. 4, 2016)

03/1/2016: 

Robots and the Law – New Academic Paper

Robots in American Law – Ryan Calo (University of Washington Law School) ([pdf](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2737598##); 44 pages)

Related: [Meet the Guy Running Our Robot Future](http://observer.com/2016/02/meet-the-guy-running-our-robot-future/) – Observer interview with Ryan Calo

Robotics Conference: [We Robot 2016](http://robots.law.miami.edu/2016/), April 1 and 2, 2016, Coral Gables, Florida

Robot Law: book of collected law of robotics research ($, [Edward Elgar Publishing](http://www.e-elgar.com/shop/robot-law))

Also:

> [Robot Walks Around, Carries Boxes and Takes a Hit in New Video](https://www.newscientist.com/article/2078796-robot-walks-around-carries-boxes-and-takes-a-hit-in-new-video/?utm_source=NSNS&utm_medium=SOC&utm_campaign=hoot&cmpid=SOC%7CNSNS%7C2016-GLOBAL-twitter) (February 24, 2016) – New Scientist on new Boston Dynamics video of its Atlas robot

> [The Robots Are Coming for Wall Street](http://www.nytimes.com/2016/02/28/magazine/the-robots-are-coming-for-wall-street.html?_r=0) (February 25, 2016) – New York Times

> [Is It Ok to Torture a Robot?](https://www.inverse.com/article/12340-is-it-ok-to-torture-a-robot) (March 3, 2016) – Inverse

02/26/2016: 

Pressure for Regulating Online Speech Related to Terrorism (updated 03.07.2016)

**The Latest:**

> [Government Enlists Tech Giants to Fight ISIS Messaging](http://edition.cnn.com/2016/02/24/politics/justice-department-apple-fbi-isis-san-bernardino/) (February 25, 2016) – CNN

> [Did Congress Immunize Twitter Against Lawsuits for Supporting ISIS?](https://www.lawfareblog.com/did-congress-immunize-twitter-against-lawsuits-supporting-isis) (January 22, 2016) ; also (i) [Tweeting Terrorists, Part I: Don’t Look Now But a Lot of Terrorist Groups are Using Twitter](https://www.lawfareblog.com/tweeting-terrorists-part-i-dont-look-now-lot-terrorist-groups-are-using-twitter), (ii) [Part II: Does it Violate the Law for Twitter to Let Terrorist Groups Have Accounts?](https://www.lawfareblog.com/tweeting-terrorists-part-ii-does-it-violate-law-twitter-let-terrorist-groups-have-accounts) and (iii) [Part III: How Would Twitter Defend Itself Against a Material Support Prosecution?](https://www.lawfareblog.com/tweeting-terrorists-part-iii-how-would-twitter-defend-itself-against-material-support-prosecution) (February 14, 2016) – Zoe Bedell and Benjamin Wittes at LawFare

> [Can Twitter Materially Support ISIS While Actively Working to Defeat It?](https://www.lawfareblog.com/can-twitter-materially-support-isis-while-actively-working-defeat-it) (February 19, 2016) – J.M. Berger at LawFare

**Previously – Law Professors Propose Regulating Dangerous Speech:**

Though apparently favored by law professors Eric Posner (University of Chicago) and Cass Sunstein (Harvard), a balancing test for first amendment review of laws targeting “dangerous speech” (that does not otherwise pose a clear and present danger) seems like both an overreaction and a misguided idea:

> [ISIS Gives Us No Choice but to Consider Limits on Speech](http://www.slate.com/articles/news_and_politics/view_from_chicago/2015/12/isis_s_online_radicalization_efforts_present_an_unprecedented_danger.single.html) – Law professor Eric Posner at Slate

> [Islamic State’s Challenge to Free Speech](http://www.bloombergview.com/articles/2015-11-23/islamic-state-s-challenge-to-free-speech) – Law professor Cass Sunstein at BloombergView

**Counterpoint:**

[ISIS, Fear, and the Freedom of Speech](http://www.huffingtonpost.com/geoffrey-r-stone/isis-fear-and-the-freedom_b_8864050.html) – Geoffrey Stone

**News Report:**

[ISIS Influence on Web Prompts Second Thoughts on First Amendment](http://www.nytimes.com/2015/12/28/us/isis-influence-on-web-prompts-second-thoughts-on-first-amendment.html?_r=0) – New York Times

**See also:**

Senator Feinstein’s “Requiring Reporting of Online Terrorist Activity Act” ([pdf](http://www.feinstein.senate.gov/public/index.cfm?a=files.serve&File_id=9BDFE0CA-FB12-4BEB-B64D-DC9239D93070); 3 pages)

[White House Seeks to Enlist Silicon Valley to ‘Disrupt Radicalization’](http://www.theguardian.com/technology/2016/jan/07/white-house-social-media-terrorism-meeting-facebook-apple-youtube-) – Guardian

[Lawmakers Want Social Media Companies to Report Terrorists](https://www.washingtonpost.com/politics/congress/lawmakers-want-social-media-companies-to-report-terrorists/2015/12/08/379f9012-9df7-11e5-9ad2-568d814bbf3b_story.html) – Washington Post

[The White House Asked Social Media Companies to Look for Terrorists. Here’s Why They’d #Fail](https://theintercept.com/2016/01/20/the-white-house-asked-social-media-companies-to-look-for-terrorists-heres-why-theyd-fail/) – Jenna McLaughlin at The Intercept

[How a ‘Digital Surge’ Can Help Beat Islamic State](http://www.latimes.com/opinion/op-ed/la-oe-1215-digital-war-on-isis-20151215-story.html) – Jared Cohen (founder and director of Google Ideas and advisor to the executive chairman of Alphabet Inc.) op-ed in the Los Angeles Times

[Google’s Chairman Wants Algorithms to Censor the Internet for Hate Speech](http://qz.com/568580/googles-chairman-wants-algorithms-to-censor-the-internet-for-hate-speech/) – Quartz, reacting to Eric Schmidt’s New York Times op-ed: [Eric Schmidt on How to Build a Better Web](http://www.nytimes.com/2015/12/07/opinion/eric-schmidt-on-how-to-build-a-better-web.html?_r=1)

[Terrorists Mock Bids to End Use of Social Media](http://www.nytimes.com/2015/12/08/technology/terrorists-mock-bids-to-end-use-of-social-media.html?_r=0) – New York Times

**And in Europe:**

[Criminalize Websites that Refuse to Delete Terrorist Content, say MEPs](http://www.cio.com/article/3008815/criminalize-websites-that-refuse-to-delete-terrorist-content-say-meps.html) – CIO

02/26/2016: 

Some Recent Academic Papers and Reports of Interest

[Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations](http://www.fas.org/sgp/crs/misc/R44187.pdf) (pdf; 12 pages) – Kristin Finklea of the Congressional Research Service

“Don’t Panic – Making Progress on the ‘Going Dark’ Debate” – Berkman Center Report (overview [here](https://cyber.law.harvard.edu/pubrelease/dont-panic/); the [Report pdf here](https://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf) (37 pages, including notes and appendices))

[T-Mobile’s Binge On Violates Key Net Neutrality Principles](https://cyberlaw.stanford.edu/downloads/vanSchewick-2016-Binge-On-Report.pdf) – Barbara van Schewick (Stanford Law School; Stanford CIS)

[Consenting to Computer Use](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2710757) – James Grimmelmann (University of Maryland Law School)

[Information Fiduciaries and the First Amendment](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2675270) – Jack Balkin (Yale Law School)

[Who Should Define Injuries for Article III Standing?](http://www.stanfordlawreview.org/sites/default/files/online/articles/68_Stan_L_Rev_Online_76_Townsend.pdf) – Daniel Townsend

**See also:**

[Daedalus’ Winter 2016 issue](http://www.mitpressjournals.org/toc/daed/current#) on “The Internet” – edited by Yochai Benkler and David Clark ($, also available for kindle at [Amazon](http://www.amazon.com/Daedalus-145-Winter-2016-Internet-ebook/dp/B01ABCBFUK))

02/1/2016: 

Recommended:

> #### Law, Tech and Policy

> **Cybersecurity**: [How Does the Cybersecurity Act of 2015 change the Internet Surveillance Laws?](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/12/24/how-does-the-cybersecurity-act-of-2015-change-the-internet-surveillance-laws/) – Orin Kerr in the Washington Post

> **TPP**:

>> [The Trouble with the TPP](http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-1-u-s-blocks-balancing-objectives/) – Canadian law professor, Michael Geist, is blogging every weekday until February 4th on what he believes are the significant problems with the Trans Pacific Partnership (TPP). The link is to his first daily post in the series

>> Human Rights Watch’s [TPP Q&A](https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership)

>> [Trans-Pacific Partnership is a Wonderful Idea . . . for China](http://www.theglobeandmail.com/report-on-business/rob-commentary/trans-pacific-partnership-is-a-wonderful-idea-for-china/article27939142/) – Dan Breznitz (University of Toronto) in the Globe and Mail

>> See also: my earlier posts on the TPP – [here](https://www.jrmchale.org/2015/10/quote-of-the-day-on-the-tpp/) and [here](https://www.jrmchale.org/2015/07/impact-of-trade-pacts-on-ip-and-the-internet-link-roundup/)

> **EU vs. US on Data + Privacy**:

>> [The Transatlantic Data War – Europe Fights Back Against the NSA](https://www.foreignaffairs.com/articles/united-states/2015-12-14/transatlantic-data-war) – Henry Farrell and Abraham Newman in Foreign Affairs

>> [Time to Get Serious About Europe’s Sabotage of US Terror Intelligence Programs](http://www.skatingonstilts.com/skating-on-stilts/2016/01/time-to-get-serious-about-europes-sabotage-of-us-terror-intelligence-programs-.html) – Stewart Baker at his “Skating on Stilts” book-related website; “Skating on Stilts” has been released as a free creative commons book available [here](http://www.skatingonstilts.com/skating-on-stilts/tired-of-reading-chapters-backwards.html)

> **More on Privacy**: [Lawrence Lessig: Technology Will Create New Models for Privacy Regulation](http://blogs.wsj.com/cio/2015/12/30/lawrence-lessig-how-technology-policy-will-evolve/) – Wall Street Journal, and [A Few Keystrokes Could Solve the Crime. Would You Press Enter?](https://www.justsecurity.org/28752/keystrokes-solve-crime-press-enter/) – Jonathan Zittrain at JustSecurity

> **Internet Access**: [How Facebook Stumbled On Its Quest to Give Internet Away For Free](http://www.buzzfeed.com/alexkantrowitz/how-facebooks-plan-to-give-the-world-free-mobile-internet-we#.ed86zwVoK) – BuzzFeed; See Also: [Tech’s ‘Frightful 5’ Will Dominate Digital Life for Foreseeable Future](http://www.nytimes.com/2016/01/21/technology/techs-frightful-5-will-dominate-digital-life-for-foreseeable-future.html?utm_source=loopinsight.com&utm_medium=referral&utm_campaign=Feed%3A+loopinsight%2FKqJb+(The+Loop)&utm_content=FeedBurner&_r=0) – New York Times

> **Whistleblower Protections**: [Protect Intelligence Whistleblowers](http://democracyjournal.org/magazine/39/protect-intelligence-whistleblowers/) – Mieke Eoyang in Democracy Journal, and PEN America’s report [Secret Sources: Whistleblowers, National Security and Free Expression](http://www.pen.org/sites/default/files/Secret%20Sources%20report.pdf) (pdf; 40 pages)

> **Freedom of Information Act Reform**: [Here’s How the Senate Should Fix the FOIA Reform Bill](https://www.eff.org/deeplinks/2016/01/heres-how-senate-should-fix-foia-reform-bill) – EFF

> **Cybercrime**: [Judges Struggle with Cyber Crime Punishment](http://thehill.com/policy/cybersecurity/265285-judges-struggle-with-cyber-crime-punishment) – The Hill

> **TOR**:

>> How Tor Works: [Part One](http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/); [Part Two](http://jordan-wright.com/blog/2015/05/09/how-tor-works-part-two-relays-vs-bridges/) – Jordan Wright

>> [How Tor’s Privacy was (Momentarily) Broken, and the Questions it Raises](http://theconversation.com/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises-52048) – The Conversation

>> [Shari Steele on Online Anonymity: Tor Staff are ‘Freedom Fighters’](http://www.theguardian.com/technology/2016/jan/11/shari-steele-tor-encryption-online-anonymity-censorship) – Guardian

> **IoT**: [DMCA and the Internet of Things](https://www.schneier.com/blog/archives/2015/12/dmca_and_the_in.html?utm_source=twitterfeed&utm_medium=twitter) and [The Internet of Things that Talk About You Behind Your Back](https://www.schneier.com/blog/archives/2016/01/the_internet_of.html) – Bruce Schneier at his Schneier on Security. See also: [The problem with self-driving cars: who controls the code?](http://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code) – Cory Doctorow in The Guardian

> **Robots**: [Robots in War: the Next Weapons of Mass Destruction?](http://www.weforum.org/agenda/2016/01/robots-in-war-the-next-weapons-of-mass-destruction) – UCBerkeley professor, Stuart Russell; Related: [What If: Robots Go to War?](http://www.weforum.org/events/world-economic-forum-annual-meeting-2016/sessions/what-if-robots-go-to-war) Davos World Economic Forum (video; substance begins at 3:40)

> **The Mobile Internet**: [16 Mobile Theses](http://ben-evans.com/benedictevans/2015/12/15/16-mobile-theses) – Benedict Evans

> **IP and Startups**: [Oculus Faces Messy Ownership Claims Over Its Head Mounted Display: Total Recall v. Luckey](http://blog.ericgoldman.org/archives/2016/01/oculus-faces-messy-ownership-claims-over-its-head-mounted-display-total-recall-v-luckey.htm) – Technology & Marketing Law Blog

> **Tech and Age Discrimination**: [Is Ageism in Tech an Under-the-Radar Diversity Issue?](http://www.fastcompany.com/3054204/the-future-of-work/is-ageism-in-tech-an-under-the-radar-diversity-issue) – FastCompany, and [Here’s How to Start Closing Silicon Valley’s Age Gap](https://medium.com/backchannel/here-s-how-to-start-closing-silicon-valley-s-age-gap-f127a6646de8#.srt6kej26) – Steven Levy

> #### General Interest

> The Millions’ [Great 2016 Book Preview](http://www.themillions.com/2016/01/most-anticipated-the-great-2016-book-preview.html) and The Morning News [2016 Tournament of Books](http://www.themorningnews.org/article/the-2016-tournament-of-books-shortlist-and-judges)

> [What Sean Penn Teaches Us About How Not to Chat with a Fugitive](https://theintercept.com/2016/01/12/sean-penn-el-chapo-opsec/) – The Intercept; See also: [How DEA Agents Took Down Mexico’s Most Vicious Drug Cartel](http://www.theatlantic.com/magazine/archive/2016/01/drug-enforcement-agency-mexico-drug-cartel/419100/) – The Atlantic, and [Censor or Die: The Death of Mexican News in the Age of Drug Cartels](https://www.washingtonpost.com/investigations/censor-or-die-the-death-of-mexican-news-in-the-age-of-drug-cartels/2015/12/09/23acf3ae-8a26-11e5-9a07-453018f9a0ec_story.html) – Washington Post

01/31/2016: 

FTC’s Native Advertising Guidance and Enforcement Policy

**FTC [Press Release](https://www.ftc.gov/news-events/press-releases/2015/12/ftc-issues-enforcement-policy-statement-addressing-native)** – December 22, 2015

**FTC Enforcement Policy Statement on Native Advertising:** [pdf](https://www.ftc.gov/system/files/documents/public_statements/896923/151222deceptiveenforcement.pdf) (16 pages)

**FTC Guide for Business:** [Native Advertising](https://www.ftc.gov/tips-advice/business-center/guidance/native-advertising-guide-businesses)

**News Reports:**

> [FTC Issues New Rules for Native Advertising on the Internet](http://recode.net/2015/12/22/ftc-issues-new-rules-to-native-advertising-on-the-internet/) – Re/Code

> [The FTC has Finally Given Some Specific Guidance on What Native Ads are Meant to Look Like](http://www.businessinsider.com/ftc-issues-native-advertising-guidance-2015-12) – BusinessInsider

> [Trade Group Takes Issue With FTC’s Native Advertising Guidelines; IAB Says Some Guidelines are ‘Overly Prescriptive’](http://www.wsj.com/articles/trade-group-takes-issue-with-ftcs-native-advertising-guidelines-1450982521) – Wall Street Journal

**Related:**

> **Study** – [Going Native: Effects of Disclosure Position and Language on the Recognition and Evaluation of Online Native Advertising](http://www.tandfonline.com/doi/full/10.1080/00913367.2015.1115380) – Bartosz W. Wojdynskia & Nathaniel J. Evans (Grady College – University of Georgia), published in the Journal of Advertising. Study News Coverage: [Consumers Can’t Tell Native Ads From Editorial Content](http://www.mediapost.com/publications/article/265789/consumers-cant-tell-native-ads-from-editorial-con.html)

> **Academic Paper** – [Native Advertising and Endorsement: Schema, Source-Based Misleadingness, and Omission of Material Facts](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2703824) (pdf; 23 pages) – Chris Jay Hoofnagle (School of Information, University of California, Berkeley, and School of Law, Berkeley Center for Law & Technology) and Eduard Meleshinsky (Bryan Schwartz Law)

01/13/2016: 

Quote of the Day

> “There is no argument whatsoever that the proliferation of devices and information are empowering. It is categorically true, not to mention obvious, that technology is today far more democratically available than it was yesterday and less than it will be tomorrow . . . . This is perhaps our last fundamental tradeoff before the Singularity occurs: Do we, as a society, want the comfort and convenience of increasingly technologic, invisible digital integration enough to pay for those benefits with the liberties that must be given up to be protected from the downsides of that integration?

> Ray Kurzweil is beyond all doubt correct; within the career lifetime of nearly everyone in this room, algorithms will be smarter than we are, and they will therefore be called upon to do what we cannot — to protect us from other algorithms, and to ask no permission in so doing. Do we, like Ulysses, lash ourselves to the mast or do we, as the some would say, relax and enjoy the inevitable? What would we have science do? What are the possible futures you will tolerate? What horses do you want not let out of the barn?”

— [Dan Geer](http://geer.tinho.net/geer.issa.13×15.txt), ISSA Chicago

See also: [The Risks — and Benefits — of Letting Algorithms Judge Us](http://www.cnn.com/2016/01/06/opinions/schneier-china-social-scores/) – Bruce Schneier op-ed at CNN

01/8/2016: 

China’s New Anti-Terrorism Law and Encryption

**Unofficial Translation:**

[Counter-Terrorism Law (2015)](http://chinalawtranslate.com/反恐怖主义法-(2015)/?lang=en) at China Law Translate

> See also: [What China’s Anti-Terrorism Legislation Actually Says](https://www.lawfareblog.com/what-chinas-anti-terrorism-legislation-actually-says) – Benjamin Bissell at LawFare

**News Reports:**

[China Antiterror Law Doesn’t Require Encryption Code Handovers; but Law Passed by Rubber-stamp Parliament Sunday Still Raises Concerns About its Scope and Impact](http://www.wsj.com/articles/china-antiterror-law-doesnt-require-encryption-code-handovers-1451270383) – Wall Street Journal

[China’s New Anti-Terror Law: No Backdoors, but Decryption on Demand](http://arstechnica.com/tech-policy/2015/12/chinas-new-anti-terror-law-copies-uk-no-backdoors-but-decryption-on-demand/) – ArsTechnica

**Related – on China:**

[In Cyberspace, China’s Aim is to Control and Censor, No Matter What it Says](http://www.scmp.com/comment/insight-opinion/article/1893924/cyberspace-chinas-aim-control-and-censor-no-matter-what-it?utm_source=&utm_medium=&utm_campaign=SCMPSocialNewsfeed) – Zhou Zunyou op-ed in South China Morning Post

[U.S., China Vow Not to Engage in Economic Cyberespionage](https://www.washingtonpost.com/national/us-china-vow-not-to-engage-in-economic-cyberespionage/2015/09/25/90e74b6a-63b9-11e5-8e9e-dce8a2a2a679_story.html) – Washington Post (09.25.2015);   [What Explains the U.S.-China Cyber ‘Agreement’?](https://www.lawfareblog.com/what-explains-us-china-cyber-agreement) – Jack Goldsmith at LawFare ; [Why the U.S.-China Cyber Spying Ban Will Inevitably Fail](http://nationalinterest.org/feature/why-the-us-china-cyber-spying-ban-will-inevitably-fail-14219?page=show) – Jennifer McArdle at The National Interest

[Courage on Trial in China](http://www.nytimes.com/2015/12/23/opinion/courage-on-trial-in-china.html?_r=0) – Ai Weiwei op-ed in New York Times;   [‘I’m a Petitioner – Open Fire!’
Chaohua Wang on Justice in China](http://www.lrb.co.uk/v37/n21/chaohua-wang/im-a-petitioner-open-fire) – London Review of Books;   [How ‘Picking Quarrels’ Became Beijing’s Go-To Weapon in Anti-dissident Lawfare](https://www.hongkongfp.com/2015/12/22/how-picking-quarrels-became-beijings-go-to-weapon-in-anti-dissident-lawfare/) – Hong Kong Free Press

[Microsoft Failed to Warn Victims of Chinese Email Hack: Allegations by Former Employees](http://www.reuters.com/article/us-microsoft-china-insight-idUSKBN0UE01Z20160101) – Reuters

Looking Backward: 2015; Looking Forward: 2016

Professor Eric Goldman’s [Top 10 Internet Law Developments of 2015](http://www.forbes.com/sites/ericgoldman/2016/01/25/top-10-internet-law-developments-of-2015-2/#68c9c9786711). In addition to his piece in Forbes, Professor Goldman also has a series of useful blog posts up at his [Technology & Marketing Law Blog](http://blog.ericgoldman.org) on 2nd half 2015 legal developments in a variety of internet/IP categories.

The State of the Law: 2016 – [pdf](http://www.realworldcrypto.com/rwc2016/program/Cardozo.RealWorldCrypto.pdf?attredirects=0&d=1) of the slides from EFF’s Nate Cardozo’s [Real World Cryptography Conference 2016](http://www.realworldcrypto.com/rwc2016/program) presentation.

AccessNow’s [Five Predictions for Digital Rights in 2016](https://www.accessnow.org/five-predictions-for-digital-rights-in-2016/)

Peter Rojas’ [Eight Questions About Virtual Reality in 2016 (and Beyond)](http://roj.as/blog/seven-questions-about-virtual-reality-in-2016-and-beyond)

Georgia Tech Institute for Information Security and Privacy’s [Emerging Cyber Threats Report 2016](http://www.iisp.gatech.edu/sites/default/files/documents/2016_georgiatech_cyberthreatsreport_onlinescroll.pdf) (pdf; 17 pages)

01/1/2016: 

Recommended:

> #### Law, Tech and Policy

> **CISA update**: [Lawmakers Have Snuck CISA Into a Bill That Is Guaranteed to Become a Law](http://motherboard.vice.com/read/lawmakers-have-snuck-cisa-into-a-bill-that-is-guaranteed-to-become-a-law) – MotherBoard. See also: [OmniCISA Pits DHS Against the FCC and FTC on User Privacy](https://www.justsecurity.org/28386/omnicisa-pits-government-against-self-privacy/) – Jennifer Granick at JustSecurity. And previously: [Cyberlaw Professors Oppose CISA](http://www.elon.edu/e-net/Article/122816)

> **Do Not Track**: [FCC Says It Will Not Require Websites to Honor ‘Do Not Track’](http://www.insideprivacy.com/united-states/federal-communications-commission/fcc-says-it-will-not-require-websites-to-honor-do-not-track/) – Covington’s InsidePrivacy. Reaction: [The FCC’s DNT Decision: The Right Call, For Now](https://www.eff.org/deeplinks/2015/11/fccs-dnt-decision-right-call-now) – EFF. See also: [How ‘Do Not Track’ Ended Up Going Nowhere](http://recode.net/2016/01/04/how-do-not-track-ended-up-going-nowhere/) – Re/Code; [Understanding ‘Do Not Track’: Truth and Consequences](http://recode.net/2016/01/12/understanding-do-not-track-truth-and-consequences/) – Jason Kint at Re/Code; and [Court Says Tracking Web Histories Can Violate Wiretap Act](http://www.wired.com/2015/11/court-says-tracking-web-histories-can-violate-wiretap-act/) – Wired

> **CFAA**: [Court (2nd Circuit): Breaking Your Employer’s Computer Policy Isn’t a Crime](https://www.eff.org/deeplinks/2015/12/federal-court-appeals-rejects-notion-violating-your-employers-computer-use) – EFF; See also [The CFAA Meets the ‘Cannibal Cop’ in the Second Circuit and Maybe Beyond](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/13/the-cfaa-meets-the-cannibal-cop-in-the-second-circuit-and-maybe-beyond/) – Orin Kerr at the Washington Post

> **European Developments**: [European Court of Human Rights says Blanket Surveillance is a Violation](http://arstechnica.co.uk/tech-policy/2015/12/european-court-of-human-rights-says-blanket-surveillance-is-a-violation/) – ArsTechnica, and [Did the European Court of Human Rights Just Outlaw ‘Massive Monitoring of Communications’ in Europe?](https://cdt.org/blog/did-the-european-court-of-human-rights-just-outlaw-massive-monitoring-of-communications-in-europe/) – CDT. Also: [European Parliament Rejects Amendments Protecting Net Neutrality](http://www.theverge.com/2015/10/27/9619962/eu-net-neturality-vote) – Verge, and [The European Parliament Just Dealt a Major Blow to Net Neutrality](http://www.businessinsider.com/european-parliament-net-neutrality-vote-2015-10) – Business Insider

> **National Security Letters**: [See for Yourself for the First Time What User Data the FBI Demanded in a National Security Letter](https://reason.com/blog/2015/11/30/see-for-yourself-what-user-data-the-fbi) – Reason; and [Scope of National Security Inquiry is Revealed](http://www.nytimes.com/2015/12/01/us/politics/scope-of-national-security-inquiry-is-revealed.html?_r=0) – New York Times

> **Privacy**:

>> [The Growing Problems with the Sectoral Approach to Privacy Law](https://www.teachprivacy.com/problems-sectoral-approach-privacy-law/) – Daniel Solve at the Privacy+Security Blog

>> [Key 2015 Privacy Papers Selected as ‘Must Reads’ for Policymakers](http://www.techpolicy.com/Blog/Featured-Blog-Post/Key-Privacy-Papers-Selected-as-Must-Reads”-for-Po.aspx) – TAP

> **Predictive Policing**: [Microsoft is Building an App that can Predict Criminal Behavior](http://www.businessinsider.com/microsofts-crime-fighting-app-2015-12) – Business Insider. See also: [The Constitution Can’t Defend You From Predictive Policing and Here’s Why](http://mic.com/articles/127823/how-pre-crime-law-works#.zptzmL72z) – .Mic

> **Consumer Reviews**: [Senate Commerce Committee Approves Consumer Review Freedom Act](http://blog.ericgoldman.org/archives/2015/11/senate-commerce-committee-approves-consumer-review-freedom-act-forbes-cross-post.htm) – Technology & Marketing Law Blog. The [Act](https://www.govtrack.us/congress/bills/114/s2044) was subsequently approved by the Senate.

> **Cybersecurity**:

>> [Your Unhashable Fingerprints Secure Nothing](http://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/) – Hackaday

>> [Let’s Encrypt](https://letsencrypt.org) has begun issuing free HTTPS certificates in [its public beta](https://letsencrypt.org/2015/12/03/entering-public-beta.html)

> #### General Interest

> [Her Code Got Humans on the Moon and Invented Software Itself](http://www.wired.com/2015/10/margaret-hamilton-nasa-apollo/) – Wired profile of Margaret Hamilton

> [26 Charts and Maps that Show the World is Getting Much, Much Better](http://www.vox.com/2014/11/24/7272929/charts-thankful) – Vox

> [Write Like You Talk](http://paulgraham.com/talk.html) – Paul Graham

> [The Interactive, Annotated Edition of ‘Bartleby, the Scrivener’ You Always Wanted](http://www.slate.com/articles/arts/culturebox/2015/10/herman_melville_s_bartleby_the_scrivener_an_interactive_annotated_text.html) – Slate

> [The Entire Season: An Elegy for Charlie Trotter](http://electricliterature.com/the-entire-season-an-elegy-for-charlie-trotter/) – Matthew Gavin Frank writing at Electric Literature

> [](https://twitter.com/sneakdotberlin/status/658730359232819200)   “At least twice in human history, individual people decided to avoid global nuclear war: [[one]](https://en.wikipedia.org/wiki/Stanislav_Petrov), [[two]](http://thebulletin.org/okinawa-missiles-october8826)” – Jeffrey Paul [(@sneakdotberlin)](https://twitter.com/sneakdotberlin): October 26, 2015. See also: [Newly Declassified Documents Reveal How America Missed a Major Nuclear War Scare](http://theweek.com/articles/584746/newly-declassified-documents-reveal-how-america-missed-major-nuclear-war-scare) – The Week

12/17/2015: 

EU Deal on New Data Protection Rules

[Press Release](http://europa.eu/rapid/press-release_IP-15-6321_en.htm) from the European Commission

**EU Directive** ([pdf](http://statewatch.org/news/2015/dec/eu-council-dp-dir-leas-draft-final-compromise-15174-15.pdf) – 106 pages – of the “Directive on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data”)

**EU Regulation** ([pdf](http://statewatch.org/news/2015/dec/eu-council-dp-reg-draft-final-compromise-15039-15.pdf) – 209 pages – of the consolidated text of the draft General Data Protection Regulation to replace 1995 Directive)

**News Reports:**

[EU Strikes Deal on Data Protection Rules; Agreement is the Biggest Overhaul of European Privacy Laws in Two Decades](http://www.politico.eu/article/deal-data-protection-laws-parliament-privacy-tech-digital/) – Politico

[Europe Approves Tough New Data Protection Rules](http://www.nytimes.com/2015/12/16/technology/eu-data-privacy.html?_r=0) – New York Times

[EU Officials Reach Agreement on Text of New Privacy Law; Deal on EU Privacy Law Caps Four Years of Haggling, Lobbying](http://www.wsj.com/articles/eu-officials-reach-agreement-on-text-of-new-privacy-law-1450209502) – Wall Street Journal

**Reaction:**

[Ten Implications of the New EU General Data Protection Regulation](https://www.teachprivacy.com/new-eu-data-protection-regulation-gdpr/) – Daniel Solove at his TeachPrivacy

[People Aren’t Happy with Europe’s Tough New Rules for Data Protection](http://www.businessinsider.com/europe-data-protection-rules-responses-digital-europe-edri-ad-industry-2015-12) – Business Insider

[New EU Privacy Rule Could Cost U.S. Firms Billions](http://www.usatoday.com/story/life/web-to-watch/tech-gaming/2015/12/14/eu-european-union-privacy-directive-google-facebook/77314554/) – USA Today

12/16/2015: