Technology

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

by

Nov 17th, 2022

Twitter, Elon, Ye, and the “Lex Platformia” – Emergent Rules for Governing Social Media

by

Nov 9th, 2022

The Mining Gap: Critical Minerals and Geopolitical Competition

by and

Nov 7th, 2022

The Biden Administration’s SIGINT Executive Order, Part II: Redress for Unlawful Surveillance

by

Nov 4th, 2022

The Biden Administration’s SIGINT Executive Order, Part I: New Rules Leave Door Open to Bulk Surveillance

by

Oct 31st, 2022

Emerging Tech Has a Front-Row Seat at India-Hosted UN Counterterrorism Meeting. What About Human Rights?

by

Oct 28th, 2022

India’s Abuses at Home Raise Concerns About Its Global Counterterrorism Role

by

Oct 27th, 2022

New US Semiconductor Export Controls Signify Dramatic Shift in Tech Relations With China

by

Oct 24th, 2022

Dawning Digital Data Access via New EU Law

by

Oct 20th, 2022

Why the US Still Can’t Have It All: Biden’s National Security Strategy

by

Oct 14th, 2022

A Different Kind of Russian Threat – Seeking to Install Its Candidate Atop Telecommunications Standards Body

by and

Sep 28th, 2022

Tech Firms Promise to Address Hate and Extremism, Again

by

Sep 15th, 2022

Gendering the Legal Review of New Means and Methods of Warfare

by

Aug 23rd, 2022

Five Years After “Unite the Right”: Reflections on Charlottesville for Today’s Threat Landscape

by and

Aug 12th, 2022

Banning Content Platforms is Not a Solution to Hate Speech on the Internet, Even When the Platform is Meta

by

Aug 9th, 2022

The Tenth NPT Revcon: What’s at Stake for the Global Nuclear Order

by

Jul 29th, 2022

The Biden Administration’s China Policy: An Inventory of Actions to Address the Challenge 

by

Jul 8th, 2022

The Existential Threat of AI-Enhanced Disinformation Operations

by

Jul 8th, 2022

NATO Must Tackle Digital Authoritarianism

by and

Jun 29th, 2022

Researchers Release Comprehensive Twitter Dataset of False Claims About The 2020 Election

by

Jun 15th, 2022

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

by and

May 13th, 2022

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

by and

May 13th, 2022

Empowering Security Researchers Will Improve Global Cybersecurity

by , and

May 6th, 2022

Facebook Provided Warning to FBI Before January 6, GAO Report Reveals

by

May 5th, 2022

What Elon Musk Does Not Get about Twitter and Democracy in Africa

by

May 4th, 2022

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

by , and

Apr 18th, 2022

Ukraine May Mark a Turning Point in Documenting War Crimes

by

Mar 28th, 2022

Україна може стати поворотним моментом у документуванні воєнних злочинів

by

Mar 28th, 2022

Amid New Trial, End of Chinese Espionage “Initiative” Brings Little Relief to US Academics Caught in Net of Fear

by and

Mar 22nd, 2022

Розслідування МКС в Україні: краш-тест для доказів, створених користувачами

by and

Mar 2nd, 2022

The Int’l Criminal Court’s Ukraine Investigation: A Test Case for User-Generated Evidence

by and

Mar 2nd, 2022

Disinformation, Radicalization, and Algorithmic Amplification: What Steps Can Congress Take?

by

Feb 7th, 2022

1 3 4 5 6 7 13