Voter registration systems provide an additional target for hackers intending to disrupt the US midterm elections; if voting machines themselves are too disperse or too obvious a target, removing voters from the rolls could have a similar effect. in Esquire, Jack Holmes explains that election security experts consider this one of many nightmare scenarios facing the American voting public—and thus, American democracy itself—on the eve of the 2018 midterm elections. (Allison Berke, Executive Director of the Stanford Cyber Initiative, quoted.)
Interacting with a machine may seem like a strange and impersonal way to seek mental health care, but advances in technology and artificial intelligence are making that type of engagement more and more a reality. Online sites such as 7 Cups of Tea and Crisis Text Line are providing counseling services via web and text, but this style of treatment has not been widely utilized by hospitals and mental health facilities.
The United States government hacks computer systems for law enforcement purposes. This Article provides the first comprehensive examination of how federal law regulates government malware, and argues that government hacking is inherently a Fourth Amendment search. Noted privacy scholar and Cyber Initiative fellow Jonathan Mayer explores the legal questions behind government use of hacking tools.