Technology

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls

by

Oct 29th, 2018

On Big Brother Watch v. U.K.: The Future of Surveillance at Two Europe-Wide Courts

by

Oct 15th, 2018

Does Pervasive Secrecy Impede Intelligence Collection?: How Intelligence Agencies Could Use Crowdsourcing to Foil WMD Attacks

by

Sep 5th, 2018

Tech Companies Are Still Slow Walking Disclosures of Election Interference and Controlling Hate Speech

by and

Aug 22nd, 2018

A U.S. GDPR? Not Even Close  

by

Aug 20th, 2018

Lawmakers in UK and US Propose Sweeping Changes to Tech Policies to Combat Misinformation

by

Aug 3rd, 2018

Google’s Dragonfly: A Bellwether for Human Rights in the Digital Age

by and

Aug 2nd, 2018

Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement

by and

Jul 25th, 2018

Launch Event – Low-Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge

by and

Jul 24th, 2018

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility

by

Jul 19th, 2018

Cybersecurity and the 2020 Census: Are We Prepared?

by

Jul 18th, 2018

AI-4-Good in War

by

May 15th, 2018

Google Employees’ Ire Over DoD’s AI Work Shows Need to Bridge Tech and Security

by

May 1st, 2018

It’s Not a Filter Bubble. It’s a Filter Shroud

by

Mar 26th, 2018

Mr. Zuckerberg, Here’s How You Should Be Regulated

by and

Mar 23rd, 2018

New Bill That Would Give Foreign Governments a Fast Track to Access Data

by and

Mar 13th, 2018

The Lethal Autonomous Weapons Governmental Meeting (Part I: Coping with Rapid Technological Change)

by

Nov 9th, 2017

Digital Disruption of Human Rights

by

Mar 25th, 2016

Surveillance Is Still About Power

by

Feb 9th, 2016

IBM’s Terrorist-Hunting Software Raises Troubling Questions

by

Feb 3rd, 2016

A Few Keystrokes Could Solve the Crime. Would You Press Enter?

by

Jan 12th, 2016

Just Security’s Second Anniversary Event: The Going Dark Debate

by

Sep 10th, 2015

The Difficulty With Metaphors and the Fourth Amendment

by

Aug 31st, 2015

It’s Time to End the “Debate” on Encryption Backdoors

by

Jul 7th, 2015

Crowdsourcing Intelligence – Putting Smart Phones to Good Use

by

May 14th, 2014

1 5 6 7