Technology

× Clear Filters
259 Articles
Ian James Mwai (R), 23, browses social media platforms on his mobile phone with a member of his outfit of social media influencers at an office in Thika town, central Kenya on April 26, 2022. He was in the vanguard of the growing ranks of influencers feverishly punching keyboards and hoping to tilt the outcome of the country's high-stakes elections, being conducted today, Aug. 9. The rising dominance of apps like Twitter and Facebook has opened a new front in Kenyan politics, with candidates desperate to draw the attention of the country's 12 million social media users.

Banning Content Platforms is Not a Solution to Hate Speech on the Internet, Even When the Platform is Meta

Governments should recognize that pulling the plug on the internet – or on an entire social media platform – is not a viable solution to the spread of hate speech or misinformation…

The Biden Administration’s China Policy: An Inventory of Actions to Address the Challenge 

An overview shows a hardline approach partially inherited from Trump merged with an emphasis on working with allies and partners. 
Image: Hands hold a smartphone, the screen of which shows a series of chat messages in Chinese. The background is dark. This picture taken on July 16, 2021 shows user Melissa messaging her virtual boyfriend - a chatbot created by XiaoIce, an artificial intelligence system designed to create emotional bonds with its estimated 660 million users worldwide - on her mobile phone in Beijing. - (Photo by WANG ZHAO/AFP via Getty Images)

The Existential Threat of AI-Enhanced Disinformation Operations

As AI capabilities improve, they will become increasingly effective tools for manipulating and fooling humans - with political, social, and epistemological consequences.
Spain's Prime Minister Pedro Sanchez (R) and US President Joe Biden address a press conference following their meeting ahead of a NATO summit, at La Moncloa Palace in Madrid, on June 28, 2022.

NATO Must Tackle Digital Authoritarianism

NATO must prepare to shape an era of intensifying great power competition and profound technological disruption.
Woman walking in front of red-brown building with words "NSO Group" visible on side.

NSO v. WhatsApp: Should the Solicitor General Recommend Allowing Foreign Corporations to Claim Immunity?

"The best position for the Solicitor General to take on the immunity of corporations is the one the Ninth Circuit adopted: 'If an entity does not fall within the Act’s definition…

Russia’s Nuclear Threat Inflation: Misguided and Dangerous

Putin's cavalier use of nuclear coercive diplomacy poses risks for international relations and Russia’s own national security policy.
A person holds a cell phone as they type on a laptop.

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

En vez de "un enfoque proporcionado ... da prioridad a la aplicación de la ley en detrimento de la privacidad, la protección de datos y los derechos humanos."
A person holds a cell phone as they type on a laptop.

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

The treaty creates a range of new policing powers with weak privacy and human rights standards and fails to include sufficient oversight.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

The first session provided a valuable view into where States stand, what the convention may aim to achieve, and its political viability.

Розслідування МКС в Україні: краш-тест для доказів, створених користувачами

Рекомендації щодо найкращих практик можуть зменшити безпекові ризики для тих, хто документує потенційні…

The Int’l Criminal Court’s Ukraine Investigation: A Test Case for User-Generated Evidence

Best practice guidelines can reduce the security risks for those documenting potential crimes and the complications for use of their material in war crimes trials.
1-12 of 259 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: