Technology
258 Articles

Launch Event – Low-Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge
Tomorrow morning (Wednesday, July 25), from 8-10 am ET, Senator Sheldon Whitehouse — along with DOJ’s former Assistant Attorney General for National Security, David Kris…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility
The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

Cybersecurity and the 2020 Census: Are We Prepared?
A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

AI-4-Good in War
The United Nations campaign entitled #AI4good highlights positive ways artificial intelligence (AI) can be used for the good of humanity. The #AI4Good Summit in Geneva this week…

Google Employees’ Ire Over DoD’s AI Work Shows Need to Bridge Tech and Security
Years ago, at a conference of national security types, I asked a pointed question of two former senior intelligence officials about encryption, and whether it was good for the…

It’s Not a Filter Bubble. It’s a Filter Shroud
The filter bubble is floating in hot water these days. “Your filter bubble is destroying democracy,” Wired tells us. Bill Gates says filter bubbles are “super important”…

Mr. Zuckerberg, Here’s How You Should Be Regulated
On Wednesday, Mark Zuckerberg finally ended days of silence and set out on a media tour to explain Facebook’s role in the Cambridge Analytica data scandal. CNN’s Laurie Segall…

New Bill That Would Give Foreign Governments a Fast Track to Access Data
Increasingly, foreign governments have complained that the MLAT process in the U.S. is slow and that it allows the U.S. Government as a gatekeeper of electronic data. The CLOUD…

The Lethal Autonomous Weapons Governmental Meeting (Part I: Coping with Rapid Technological Change)
This week nations meet at the United Nations to discuss lethal autonomous weapon systems (LAWS), including robotic weapons that might hunt for targets on their own. It has been…

Digital Disruption of Human Rights
Last week, we explored the conceptual challenges to the universal human rights framework that have been brought by digital technology. Today, we shift from conceptual to concrete…

Surveillance Is Still About Power
Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…

IBM’s Terrorist-Hunting Software Raises Troubling Questions
Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…