Technology
260 Articles
Surveillance Is Still About Power
Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
IBM’s Terrorist-Hunting Software Raises Troubling Questions
Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
A Few Keystrokes Could Solve the Crime. Would You Press Enter?
Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…
The Wiretap Spike at Facebook: WhatsApp With That?
Vice’s Motherboard is puzzling over a massive leap in the number of Title III wiretap orders served on Facebook during the first half of 2015: A whopping 201 (targeting 259 users)…
Just Security’s Second Anniversary Event: The Going Dark Debate
Two years ago this month, Steve Vladeck, Ryan Goodman, and our extraordinary Editorial Board, launched Just Security. In celebration of two fascinating years, we are thrilled to…
The Difficulty With Metaphors and the Fourth Amendment
The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…
It’s Time to End the “Debate” on Encryption Backdoors
Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…
Crowdsourcing Intelligence – Putting Smart Phones to Good Use
It is painfully clear that there are vast reservoirs of useful, untapped information in the hands of individuals across the world who are already tethered to the digital environment. …