Skip to main content
Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance

Our Work

Our Work

Broken laptop

Keys Case Spotlights Flaws of Computer Hacking Law

Old laws can cause confusion and unduly harsh consequences, particularly when courts confront situations Congress did not anticipate. This is particularly true for the Computer Fraud and Abuse Act, 18 U.S.C. § 1030—the federal "anti­hacking" statute prompted in part by fear generated by the 1983 techno­thriller "WarGames." The CFAA...

Free Speech banner, an colorful graphic representation of a megaphone

Doe I v. Cisco

In the digital age, repressive governments do not act alone to violate human rights. They have accomplices—often Western technology companies—with the sophistication and technical know-how that those repressive governments lack.
In this case, the plaintiffs are followers of the religious movement called Falun Gong in China. They were victims...

Binge On Lite? Ask for the Truth about T-Mobile Video Throttling

At Noon Today, Demand Real Answers from John Legere, CEO of T-Mobile
T-Mobile's Binge On service could have been great. Giving customers a choice about how to use their data so that they can stream more video without hitting their data cap is a wonderful idea. Unfortunately, T-Mobile botched...

Hacking the Patent System

After years of political debates over legislative fixes, the patent system still isn't working. It's expensive, slow, and often abused by trolls. And litigation is still on the rise: 2015 saw the second highest number of patent cases ever, two-thirds of which were filed by trolls. There are ongoing efforts...

Broken laptop

United States v. Matthew Keys

The case arises out of Matthew Keys turning over the username and password of the content management system of his former employer, the Tribune Company, to members of Anonymous in an online chat room. An individual going by the name of “Sharpie” then used the credentials to log into the...

Pages

Back to top

JavaScript license information