Technology

× Clear Filters
258 Articles
A 3-D illustration of scales lit up against a dark electronic background with computer terms in pale letters.

Launch Event – Low-Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge

Tomorrow morning (Wednesday, July 25), from 8-10 am ET, Senator Sheldon Whitehouse — along with DOJ’s former Assistant Attorney General for National Security, David Kris…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility

The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

Cybersecurity and the 2020 Census: Are We Prepared?

A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…
A graphic design of a person or android’s head in blue covered in lights depicting coding. Binary numbers run up and down the side of the page next to the person.

AI-4-Good in War

The United Nations campaign entitled #AI4good highlights positive ways artificial intelligence (AI) can be used for the good of humanity. The #AI4Good Summit in Geneva this week…
The new Google logo is displayed at the Google headquarters on September 2, 2015 in Mountain View, California.

Google Employees’ Ire Over DoD’s AI Work Shows Need to Bridge Tech and Security

Years ago, at a conference of national security types, I asked a pointed question of two former senior intelligence officials about encryption, and whether it was good for the…

It’s Not a Filter Bubble. It’s a Filter Shroud

The filter bubble is floating in hot water these days. “Your filter bubble is destroying democracy,” Wired tells us. Bill Gates says filter bubbles are “super important”…

Mr. Zuckerberg, Here’s How You Should Be Regulated

On Wednesday, Mark Zuckerberg finally ended days of silence and set out on a media tour to explain Facebook’s role in the Cambridge Analytica data scandal. CNN’s Laurie Segall…
Commander of the U.S. Cyber Command, Director of the National Security Agency and chief of Central Security Services Navy Adm. Michael Rogers testifies during a hearing before the Senate Armed Services Committee September 13, 2016 on Capitol Hill in Washington, DC.

New Bill That Would Give Foreign Governments a Fast Track to Access Data

Increasingly, foreign governments have complained that the MLAT process in the U.S. is slow and that it allows the U.S. Government as a gatekeeper of electronic data. The CLOUD…

The Lethal Autonomous Weapons Governmental Meeting (Part I: Coping with Rapid Technological Change)

This week nations meet at the United Nations to discuss lethal autonomous weapon systems (LAWS), including robotic weapons that might hunt for targets on their own. It has been…
Just Security

Digital Disruption of Human Rights

Last week, we explored the conceptual challenges to the universal human rights framework that have been brought by digital technology. Today, we shift from conceptual to concrete…
Just Security

Surveillance Is Still About Power

Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
1-12 of 258 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: