Technology

× Clear Filters
264 Articles

Mr. Zuckerberg, Here’s How You Should Be Regulated

On Wednesday, Mark Zuckerberg finally ended days of silence and set out on a media tour to explain Facebook’s role in the Cambridge Analytica data scandal. CNN’s Laurie Segall…
Commander of the U.S. Cyber Command, Director of the National Security Agency and chief of Central Security Services Navy Adm. Michael Rogers testifies during a hearing before the Senate Armed Services Committee September 13, 2016 on Capitol Hill in Washington, DC.

New Bill That Would Give Foreign Governments a Fast Track to Access Data

Increasingly, foreign governments have complained that the MLAT process in the U.S. is slow and that it allows the U.S. Government as a gatekeeper of electronic data. The CLOUD…

The Lethal Autonomous Weapons Governmental Meeting (Part I: Coping with Rapid Technological Change)

This week nations meet at the United Nations to discuss lethal autonomous weapon systems (LAWS), including robotic weapons that might hunt for targets on their own. It has been…
Just Security

Digital Disruption of Human Rights

Last week, we explored the conceptual challenges to the universal human rights framework that have been brought by digital technology. Today, we shift from conceptual to concrete…
Just Security

Surveillance Is Still About Power

Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Just Security

A Few Keystrokes Could Solve the Crime. Would You Press Enter?

Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…
Just Security

The Wiretap Spike at Facebook: WhatsApp With That?

Vice’s Motherboard is puzzling over a massive leap in the number of Title III wiretap orders served on Facebook during the first half of 2015: A whopping 201 (targeting 259 users)…
Just Security

Just Security’s Second Anniversary Event: The Going Dark Debate

Two years ago this month, Steve Vladeck, Ryan Goodman, and our extraordinary Editorial Board, launched Just Security. In celebration of two fascinating years, we are thrilled to…
Just Security

The Difficulty With Metaphors and the Fourth Amendment

The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…
Just Security

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…
Just Security

Crowdsourcing Intelligence – Putting Smart Phones to Good Use

It is painfully clear that there are vast reservoirs of useful, untapped information in the hands of individuals across the world who are already tethered to the digital environment. …
1-12 of 264 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: