Technology
258 Articles

Weapons of Mass Consumerism: Why China Wants Your Personal Information
A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…

Give Up the Ghost: A Backdoor by Another Name
Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know
Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

Election Security is an Immediate National Security Concern
Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls
A Russian troll sits down at his desktop and logs into one of the social media accounts he uses to impersonate and radicalize Americans. Suddenly, a direct message appears: “Hello,…

On Big Brother Watch v. U.K.: The Future of Surveillance at Two Europe-Wide Courts
A recent opinion by the European Court of Human Rights was more limited than recent decisions concerning surveillance. The European Court of Justice should seize the opportunity…

Does Pervasive Secrecy Impede Intelligence Collection?: How Intelligence Agencies Could Use Crowdsourcing to Foil WMD Attacks
For decades, the edifice of the U.S. intelligence community (IC) has been built on a single principle: that intelligence is best when it is secret. Within the IC, this principle…

Tech Companies Are Still Slow Walking Disclosures of Election Interference and Controlling Hate Speech
"While Facebook has made strides, the evidence suggests it needs to take bigger ones—and run rather than walk."

A U.S. GDPR? Not Even Close
At the end of June, California enacted a new data privacy regime that some are comparing to the European Union’s recently operative General Data Privacy Regulation (GDPR). The…

Lawmakers in UK and US Propose Sweeping Changes to Tech Policies to Combat Misinformation
Two years after the twin historic events that rocked the global system--the Brexit referendum and the US Presidential election--lawmakers in Britain and the United States are heading…

Google’s Dragonfly: A Bellwether for Human Rights in the Digital Age
Both of us vividly recall the remarkable events of 2010, when Google took its stand against Chinese government censorship by publicly declaring it would withdraw its search engine…

Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement
Whether you believe law enforcement is “going dark” or we are in a “golden age of surveillance,” law enforcement faces serious challenges in identifying and accessing digital…