Technology

Tech Firms Promise to Address Hate and Extremism, Again

by

Sep 15th, 2022

Gendering the Legal Review of New Means and Methods of Warfare

by

Aug 23rd, 2022

Five Years After “Unite the Right”: Reflections on Charlottesville for Today’s Threat Landscape

by and

Aug 12th, 2022

Banning Content Platforms is Not a Solution to Hate Speech on the Internet, Even When the Platform is Meta

by

Aug 9th, 2022

The Tenth NPT Revcon: What’s at Stake for the Global Nuclear Order

by

Jul 29th, 2022

The Biden Administration’s China Policy: An Inventory of Actions to Address the Challenge 

by

Jul 8th, 2022

The Existential Threat of AI-Enhanced Disinformation Operations

by

Jul 8th, 2022

NATO Must Tackle Digital Authoritarianism

by and

Jun 29th, 2022

Researchers Release Comprehensive Twitter Dataset of False Claims About The 2020 Election

by

Jun 15th, 2022

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

by and

May 13th, 2022

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

by and

May 13th, 2022

Empowering Security Researchers Will Improve Global Cybersecurity

by , and

May 6th, 2022

Facebook Provided Warning to FBI Before January 6, GAO Report Reveals

by

May 5th, 2022

What Elon Musk Does Not Get about Twitter and Democracy in Africa

by

May 4th, 2022

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

by , and

Apr 18th, 2022

Ukraine May Mark a Turning Point in Documenting War Crimes

by

Mar 28th, 2022

Україна може стати поворотним моментом у документуванні воєнних злочинів

by

Mar 28th, 2022

Amid New Trial, End of Chinese Espionage “Initiative” Brings Little Relief to US Academics Caught in Net of Fear

by and

Mar 22nd, 2022

Розслідування МКС в Україні: краш-тест для доказів, створених користувачами

by and

Mar 2nd, 2022

The Int’l Criminal Court’s Ukraine Investigation: A Test Case for User-Generated Evidence

by and

Mar 2nd, 2022

Disinformation, Radicalization, and Algorithmic Amplification: What Steps Can Congress Take?

by

Feb 7th, 2022

Foreign Disinformation: What the US Government Can Start Doing Now

by and

Feb 3rd, 2022

Big Tech Is Not Big Tobacco

by

Jan 13th, 2022

Mining Parler and Mapping the “Stop the Steal” Campaign

by and

Jan 6th, 2022

The Use of Biometric Technologies for Counter-terrorism Purposes in a Human Rights Vacuum

by

Dec 20th, 2021

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

by

Dec 14th, 2021

Biden’s `Initiative for Democratic Renewal’ — Analysis from Diplomats, Top Experts

by

Dec 10th, 2021

On Ransomware, Cyber Command Should Take a Backseat

by

Nov 30th, 2021

Artificial Intelligence in the Intelligence Community: Oversight Must Not Be an Oversight

by

Nov 30th, 2021

The Threat from Outer Space: Russia Tests Kinetic DA-ASAT Weapon

by

Nov 23rd, 2021

Big-Tobacco-Type Lawsuits from State AGs: A Roadmap for Redressing Facebook’s Harms

by and

Nov 18th, 2021

So, What Does Facebook Take Down? The Secret List of ‘Dangerous’ Individuals and Organizations

by and

Nov 1st, 2021

1 4 5 6 7 8 13