Technology
258 Articles

A Few Keystrokes Could Solve the Crime. Would You Press Enter?
Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…

The Wiretap Spike at Facebook: WhatsApp With That?
Vice’s Motherboard is puzzling over a massive leap in the number of Title III wiretap orders served on Facebook during the first half of 2015: A whopping 201 (targeting 259 users)…

Just Security’s Second Anniversary Event: The Going Dark Debate
Two years ago this month, Steve Vladeck, Ryan Goodman, and our extraordinary Editorial Board, launched Just Security. In celebration of two fascinating years, we are thrilled to…

The Difficulty With Metaphors and the Fourth Amendment
The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…

It’s Time to End the “Debate” on Encryption Backdoors
Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…

Crowdsourcing Intelligence – Putting Smart Phones to Good Use
It is painfully clear that there are vast reservoirs of useful, untapped information in the hands of individuals across the world who are already tethered to the digital environment. …