Marco Ciappelli🎙️✨:verified: :donor:<p>🎯 FINAL Pre-Event Interview Alert! Next Stop: Las Vegas!</p><p>This is it—our last <a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> USA 2025 conversation before we hit the road to Vegas (and who knows, maybe we'll broadcast from a desert pit stop along the way! 🚗)</p><p>But what a way to close out our pre-event coverage...</p><p>When Constitutional Law Meets <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a>: A Critical Conversation We All Need to Hear</p><p>What happens when we stop seeing government surveillance as a necessary evil and start recognizing it as a primary threat to privacy?</p><p>Jennifer Granick, ACLU's Surveillance and Cybersecurity Counsel, challenges us to rethink everything we assume about digital <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> in her upcoming <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> 2025 keynote.</p><p>In this preview conversation with Marco Ciappelli, Jennifer makes a compelling case:</p><p>✅ The Fourth Amendment hasn't kept pace with technology <br>✅ Legal reform is too slow—so technologists must lead <br>✅ Privacy isn't just a legal problem—it's a design challenge <br>✅ We need a new <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> that puts unchecked surveillance at the center</p><p>From defending hackers since <a href="https://infosec.exchange/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> 3 to fighting surveillance overreach at the ACLU, Jennifer brings decades of frontline experience to this critical discussion.</p><p>The key takeaway? While lawmakers debate, engineers and designers hold the power to protect civil liberties through encryption, data minimization, and privacy-first architecture.</p><p>This isn't just another privacy talk—it's a call to action for every technologist, policymaker, and privacy advocate.</p><p>🎥 Watch: <a href="https://youtu.be/dPCvsBqu6Uc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/dPCvsBqu6Uc</span><span class="invisible"></span></a></p><p>🎧 Listen: <a href="https://itspmagazine.simplecast.com/episodes/from-hacker-defense-to-civil-liberties-threat-modeling-meets-constitutional-law-a-black-hat-usa-2025-keynote-conversation-with-jennifer-granick-on-location-coverage-with-sean-martin-and-marco-ciappelli" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itspmagazine.simplecast.com/ep</span><span class="invisible">isodes/from-hacker-defense-to-civil-liberties-threat-modeling-meets-constitutional-law-a-black-hat-usa-2025-keynote-conversation-with-jennifer-granick-on-location-coverage-with-sean-martin-and-marco-ciappelli</span></a></p><p>📍 Follow our complete Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p>See you in Vegas! 🎰 Feeling lucky, Sean Martin, CISSP?</p><p><a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CivilLiberties" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilLiberties</span></a> <a href="https://infosec.exchange/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/BHUSA25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA25</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/ACLU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACLU</span></a> <a href="https://infosec.exchange/tags/PrivacyByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyByDesign</span></a></p>