DOJ’s Actions Risk Both Less Security and Less Liberty
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure […] More
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure […] More
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of […] More
President Barack Obama says the U.S. will respond to the Russia’s interference in the 2016 campaign. In an interview with NPR on Friday, Obama said, […] More
When it comes to attribution—especially when foreign intelligence agencies are involved—plausible deniability is easy. However, the public has come to expect courtroom-quality evidence before believing […] More
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of […] More
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only […] More
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is […] More
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. […] More
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems. The […] More
It’s hard today to find a major breach where weak identity solutions did not provide the vector of attack. More than 21 million personnel records […] More
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected […] More
Drones have traditionally been used by Western militaries as a tool in counterterrorism efforts, but insurgent and terrorist groups are increasingly turning to small hobby […] More
Search