Privacy

The U.S. National Security Memorandum on AI: Leading Experts Weigh In

by

Oct 25th, 2024

Warrantless “Defensive” Searches of FISA Section 702 Data Violate the Fourth Amendment

by

Aug 22nd, 2024

Time for U.S. Intelligence to Ask: How Did We Alienate so Many Americans?

by and

Jul 18th, 2024

Children’s Personal Photos Are Powering AI Exploitation

by

Jun 27th, 2024

Is Secret Law the Solution to an Overbroad Surveillance Authority?

by

Jun 11th, 2024

As DHS Implements New AI Technologies, It Must Overcome Old Shortcomings

by and

May 21st, 2024

The Year of Section 702 Reform, Part IV: The Government Surveillance Reform Act

by and

Nov 7th, 2023

How Section 702 Surveillance Helps Keep Sensitive U.S. Technologies From China, Russia, Iran and North Korea

by

Sep 30th, 2023

Resolving Carpenter’s Third-Party Paradox (Part II – The Solution)

by , , and

Sep 22nd, 2023

The Just Security Podcast: A Fourth Amendment Privacy Paradox

by , , , and

Sep 22nd, 2023

Resolving Carpenter’s Third-Party Paradox (Part I – The Paradox)

by , , and

Sep 21st, 2023

A Roadmap for Implementing Rules on Racial Profiling

by and

Aug 25th, 2023

Changes to UK Surveillance Regime May Violate International Law

by

Aug 22nd, 2023

A Close and Critical Look at the ‘Five Things’ the ACLU Says You Need to Know About ‘NSA Mass Surveillance’

by and

Jul 26th, 2023

DHS Intelligence Rearranges the Deck Chairs—Again

by

May 10th, 2023

Digital Privacy Legislation is Civil Rights Legislation

by and

Apr 10th, 2023

The Year of Section 702’s Reauthorization: A Reply on “Back Door” Searches

by

Mar 8th, 2023

Regulating Artificial Intelligence Requires Balancing Rights, Innovation

by

Jan 11th, 2023

UN Counterterrorism and Technology: What Role for Human Rights in Security?

by and

Nov 23rd, 2022

More Turbulence Ahead for Twitter as the EU’s Digital Services Act Tests Musk’s Vision

by and

Nov 23rd, 2022

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

by

Nov 17th, 2022

Twitter, Elon, Ye, and the “Lex Platformia” – Emergent Rules for Governing Social Media

by

Nov 9th, 2022

Myths & Misunderstandings Relating to Mar-a-Lago Documents Investigation

by

Aug 16th, 2022

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

by and

May 13th, 2022

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

by and

May 13th, 2022

As Congress Debates Social Media Harms, Here’s How to Make Online Consent Meaningful

by

Apr 27th, 2022

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

by , and

Apr 18th, 2022

Expert Explainer: On Verizon’s Deadline for Turning Over Meadows’ Records to Congress

by and

Dec 16th, 2021

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

by

Dec 14th, 2021

Surveillance and Privacy Scholars: Four Things the Government Needs From You

by

Oct 13th, 2021

Q&A on Court Ordering Facebook to Disclose Content on Myanmar Genocide

by

Sep 24th, 2021

Congress’ Access to Individuals’ Private Communications: The Jan. 6 Committee’s Troubling Precedent

by

Sep 22nd, 2021

1 2 3 7