Technology
264 Articles

Policing, U.S. Style: With Little Idea of What Really Works
Until we better analyze police strategies, policies, and technologies, and learn, in a quantifiable way, what works and what doesn’t, we are not truly advancing public safety.…

One Key Instrument to Confront China and Climate Change
The United States has an opportunity to begin tackling both the security and economic threats posed by China and those posed by climate change, through one action: investing in…

To Battle Russian Disinformation, Ukraine Mimics … Russia
In the five years since the conflict between Ukraine and Russia began, several Ukrainian initiatives have been introduced to reduce the influence of Russian disinformation and…

Trump and the Demise of the Presidential Records Honor System
News broke yesterday that Jared Kushner, President Donald Trump’s son-in-law and senior policy advisor, has been using the private messaging application WhatsApp for official…

India’s Digital Path: Leaning Democratic or Authoritarian?
As the two largest democracies in the world, India and the United States should be working together to combat this abuse of technology. But India has taken some troubling steps…

The Hidden Danger of User-Generated Evidence for International Criminal Justice
In the summer of 2017, judges at the International Criminal Court (ICC) took a remarkable step. For the first time, they issued an arrest warrant based primarily on video footage…

Weapons of Mass Consumerism: Why China Wants Your Personal Information
A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…

Give Up the Ghost: A Backdoor by Another Name
Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know
Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

Election Security is an Immediate National Security Concern
Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls
A Russian troll sits down at his desktop and logs into one of the social media accounts he uses to impersonate and radicalize Americans. Suddenly, a direct message appears: “Hello,…

On Big Brother Watch v. U.K.: The Future of Surveillance at Two Europe-Wide Courts
A recent opinion by the European Court of Human Rights was more limited than recent decisions concerning surveillance. The European Court of Justice should seize the opportunity…