Digital Surveillance

× Clear Filters
50 Articles

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

The intended crime-fighting proposals could force encrypted-messaging services to abandon basic confidentiality or pull out of the market.
A sign hanging on a pole on Queen Street in the city center of Cardiff, United Kingdom, on August 25, 2022, warns that South Wales Police are using facial recognition. To the left of the sign, blurred in the distance, are people walking by. (Photo by Matthew Horwood/Getty Images)

Emerging Tech Has a Front-Row Seat at India-Hosted UN Counterterrorism Meeting. What About Human Rights?

Hype and untested promises have accelerated deployment of artificial intelligence, biometrics, and more, in the dubious name of security.

A Different Kind of Russian Threat – Seeking to Install Its Candidate Atop Telecommunications Standards Body

The new secretary-general of the standard-setting body will have global impact on whether the digital sphere will be beneficial for all.
Woman looking at cell phone with information on Abortion Pill (RU-486) for unintended pregnancy.

With Roe v. Wade at Risk, Digital Surveillance Threatens Reproductive Freedom

If Roe is overturned, states will likely use sweeping digital surveillance tools to enforce abortion bans.
Digital fingerprint, conceptual computer illustration.

The Use of Biometric Technologies for Counter-terrorism Purposes in a Human Rights Vacuum

CTED's "best practices" on biometrics miss a key dimension: international human rights law guidance.
In this photo illustration, the logos of social media applications, WeChat, Twitter, MeWe, Telegram, Signal, Instagram, Facebook, Messenger and WhatsApp is displayed on the screen of an iPhone on October 06, 2021 in Paris, France. Frances Haugen, a former employee of the Facebook social network created by Mark Zuckerberg, told the US Senate on October 05 that Facebook was prioritizing its profits at the expense of security and the impact of the social network on young users. To support her claims, Frances Haugen draws on her two-year experience as a product manager at Facebook and on the thousands of documents she took with her last spring, grouped together under the name of "Facebook Files ".

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

Despite its “going dark” claims, the FBI can obtain a remarkable amount of user data from secure messaging apps that collectively have several billion global users.
District Attorney Cyrus R. Vance Jr. of New York County, New York; cyber security fellow Matt Tait of University of Texas at Austin, Texas; Erik Neuenschwander, Manager of User Privacy of Apple, Inc.; Jay Sullivan, Product Management Director for Privacy and Integrity in Messenger of Facebook, Inc. testify during a hearing before Senate Judiciary Committee December 10, 2019 on Capitol Hill in Washington, DC.

Client-Side Scanning: A New Front In the War on User Control of Technology

When technology has expanded to nearly every corner of our lives, how much control should users have over the devices they own?
National Counterterrorism Center Director Matthew Olsen, FBI Director James Comey, Director of National Intelligence James Clapper, CIA Director John Brennan, Defense Intelligence Agency Director Lt. Gen. Michael Flynn testify during a hearing before Senate (Select) Intelligence Committee January 29, 2014 on Capitol Hill in Washington, DC.

20 Years After the Patriot Act, America Must End Secret Law

Of the many abuses that sprung from the Patriot Act’s toxic soil, the most pernicious and enduring is the growth of secret laws. The insistence that the government must not only…
US President George W. Bush signs into law an anti-terrorism bill that expands police and surveillance powers in response to September 11 attacks on the World Trade Center and the Pentagon, 26 October 2001 in the East Room of the White House in Washington, DC. With Bush from left to right are Rep. Mike Oxley, R-OH, Sen. Orrin Hatch, R-UT, Sen Pat Leahy, D-VT, Sen. Harry Reid, D-NV, and Rep. James Sensenbrenner, R-WI.

Rethinking Surveillance on the 20th Anniversary of the Patriot Act

20 years ago, Congress enacted the PATRIOT Act. It's time to move on from that outmoded model of surveillance.
Surveillance cameras cover a pole on the corner of Tiananmen Square in Beijing on September 6, 2019.

What Biden Needs to Say About Surveillance Tech and Foreign Policy

Western countries have critiqued China's use of surveillance tech while continuing to export these tools. It's time to align human rights and trade policies.
A cylindrical cipher device.

Encryption Originalism

Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.
A person types on a laptop. Translucent icons litter the image to represent cybersecurity.

Protect Communications Privacy for All of Us—Not Just Lawmakers and Reporters

It’s Time for Congress to Finish What It Started After the Snowden Revelations.
1-12 of 50 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: