Technology

× Clear Filters
258 Articles
Shanghai at night with an overlay of binary coding.

Weapons of Mass Consumerism: Why China Wants Your Personal Information

A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…
Aerial photograph of the Government Communications Headquarters, also known as GCHQ, Cheltenham Gloucestershire.

Give Up the Ghost: A Backdoor by Another Name

Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know

Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

Election Security is an Immediate National Security Concern

Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls

A Russian troll sits down at his desktop and logs into one of the social media accounts he uses to impersonate and radicalize Americans. Suddenly, a direct message appears: “Hello,…
Political activist Katharina Nocun, speaking under a banner that reads: "No to a German NSA" and showing a picture of U.S. whistleblower Edward Snowden, leads a protest against pending legislation expanding the legal surveillance capabilities of Germany's Federal Intelligence Service (Bundesnachrichtendienst, or BND) outside the Reichstag on September 26, 2016 in Berlin, Germany. Protesters behind her hold additional signs.

On Big Brother Watch v. U.K.: The Future of Surveillance at Two Europe-Wide Courts

A recent opinion by the European Court of Human Rights was more limited than recent decisions concerning surveillance. The European Court of Justice should seize the opportunity…

Does Pervasive Secrecy Impede Intelligence Collection?: How Intelligence Agencies Could Use Crowdsourcing to Foil WMD Attacks

For decades, the edifice of the U.S. intelligence community (IC) has been built on a single principle: that intelligence is best when it is secret. Within the IC, this principle…

Tech Companies Are Still Slow Walking Disclosures of Election Interference and Controlling Hate Speech

"While Facebook has made strides, the evidence suggests it needs to take bigger ones—and run rather than walk."

A U.S. GDPR? Not Even Close  

At the end of June, California enacted a new data privacy regime that some are comparing to the European Union’s recently operative General Data Privacy Regulation (GDPR). The…

Lawmakers in UK and US Propose Sweeping Changes to Tech Policies to Combat Misinformation

Two years after the twin historic events that rocked the global system--the Brexit referendum and the US Presidential election--lawmakers in Britain and the United States are heading…

Google’s Dragonfly: A Bellwether for Human Rights in the Digital Age

Both of us vividly recall the remarkable events of 2010, when Google took its stand against Chinese government censorship by publicly declaring it would withdraw its search engine…

Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement

Whether you believe law enforcement is “going dark” or we are in a “golden age of surveillance,” law enforcement faces serious challenges in identifying and accessing digital…
1-12 of 258 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: