Technology
264 Articles

Does Pervasive Secrecy Impede Intelligence Collection?: How Intelligence Agencies Could Use Crowdsourcing to Foil WMD Attacks
For decades, the edifice of the U.S. intelligence community (IC) has been built on a single principle: that intelligence is best when it is secret. Within the IC, this principle…

Tech Companies Are Still Slow Walking Disclosures of Election Interference and Controlling Hate Speech
"While Facebook has made strides, the evidence suggests it needs to take bigger ones—and run rather than walk."

A U.S. GDPR? Not Even Close
At the end of June, California enacted a new data privacy regime that some are comparing to the European Union’s recently operative General Data Privacy Regulation (GDPR). The…

Lawmakers in UK and US Propose Sweeping Changes to Tech Policies to Combat Misinformation
Two years after the twin historic events that rocked the global system--the Brexit referendum and the US Presidential election--lawmakers in Britain and the United States are heading…

Google’s Dragonfly: A Bellwether for Human Rights in the Digital Age
Both of us vividly recall the remarkable events of 2010, when Google took its stand against Chinese government censorship by publicly declaring it would withdraw its search engine…

Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement
Whether you believe law enforcement is “going dark” or we are in a “golden age of surveillance,” law enforcement faces serious challenges in identifying and accessing digital…

Launch Event – Low-Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge
Tomorrow morning (Wednesday, July 25), from 8-10 am ET, Senator Sheldon Whitehouse — along with DOJ’s former Assistant Attorney General for National Security, David Kris…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility
The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

Cybersecurity and the 2020 Census: Are We Prepared?
A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

AI-4-Good in War
The United Nations campaign entitled #AI4good highlights positive ways artificial intelligence (AI) can be used for the good of humanity. The #AI4Good Summit in Geneva this week…

Google Employees’ Ire Over DoD’s AI Work Shows Need to Bridge Tech and Security
Years ago, at a conference of national security types, I asked a pointed question of two former senior intelligence officials about encryption, and whether it was good for the…

It’s Not a Filter Bubble. It’s a Filter Shroud
The filter bubble is floating in hot water these days. “Your filter bubble is destroying democracy,” Wired tells us. Bill Gates says filter bubbles are “super important”…