Technology

Investigating (Mis)conduct in War is Already Difficult: Will the use of Military AI Make it Harder?

by

Jan 5th, 2023

2023 Forward: Democracy, Russia-Ukraine War, Tech Policy, Climate Change

by , and

Dec 26th, 2022

UN Counterterrorism and Technology: What Role for Human Rights in Security?

by and

Nov 23rd, 2022

More Turbulence Ahead for Twitter as the EU’s Digital Services Act Tests Musk’s Vision

by and

Nov 23rd, 2022

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

by

Nov 17th, 2022

Emerging Tech Has a Front-Row Seat at India-Hosted UN Counterterrorism Meeting. What About Human Rights?

by

Oct 28th, 2022

India’s Abuses at Home Raise Concerns About Its Global Counterterrorism Role

by

Oct 27th, 2022

New US Semiconductor Export Controls Signify Dramatic Shift in Tech Relations With China

by

Oct 24th, 2022

A Different Kind of Russian Threat – Seeking to Install Its Candidate Atop Telecommunications Standards Body

by and

Sep 28th, 2022

Gendering the Legal Review of New Means and Methods of Warfare

by

Aug 23rd, 2022

DHS IG Cuffari’s Actions Exhibit Clear Pattern: Unwillingness or Inability to Meet the Mission

by

Aug 11th, 2022

Banning Content Platforms is Not a Solution to Hate Speech on the Internet, Even When the Platform is Meta

by

Aug 9th, 2022

The Biden Administration’s China Policy: An Inventory of Actions to Address the Challenge 

by

Jul 8th, 2022

The Existential Threat of AI-Enhanced Disinformation Operations

by

Jul 8th, 2022

NATO Must Tackle Digital Authoritarianism

by and

Jun 29th, 2022

NSO v. WhatsApp: Should the Solicitor General Recommend Allowing Foreign Corporations to Claim Immunity?

by

Jun 9th, 2022

Russia’s Nuclear Threat Inflation: Misguided and Dangerous

by and

May 31st, 2022

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

by and

May 13th, 2022

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

by and

May 13th, 2022

Empowering Security Researchers Will Improve Global Cybersecurity

by , and

May 6th, 2022

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

by , and

Apr 18th, 2022

Розслідування МКС в Україні: краш-тест для доказів, створених користувачами

by and

Mar 2nd, 2022

The Int’l Criminal Court’s Ukraine Investigation: A Test Case for User-Generated Evidence

by and

Mar 2nd, 2022

Disinformation, Radicalization, and Algorithmic Amplification: What Steps Can Congress Take?

by

Feb 7th, 2022

Foreign Disinformation: What the US Government Can Start Doing Now

by and

Feb 3rd, 2022

Mining Parler and Mapping the “Stop the Steal” Campaign

by and

Jan 6th, 2022

China’s Nuclear Buildup is About More Than Nukes

by

Jan 4th, 2022

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

by

Dec 14th, 2021

Artificial Intelligence in the Intelligence Community: Oversight Must Not Be an Oversight

by

Nov 30th, 2021

What the Afghanistan Withdrawal Teaches Us About Safeguarding Human Rights Evidence

by

Nov 5th, 2021

Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era

by , and

Oct 29th, 2021

Client-Side Scanning: A New Front In the War on User Control of Technology

by

Oct 28th, 2021

1 2 3 4 5 7