• CYBERSECURITYCybersecurity and Data Protection: Does ChatGPT Really Make a Difference?

    Cybersecurity and data privacy have become central concerns, affecting business operations and user safety worldwide. A new analysis has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union, the United States, and China.

  • PRIVACYDozens of Rogue California Police Agencies Still Sharing Driver Locations with Anti-Abortion States

    In October 2023, California Attorney General Rob Bonta clarified that a 2016 state law, SB 34, prohibits California’s local and state police from sharing information collected from automated license plate readers (ALPR) with out-of-state or federal agencies. Despite the Attorney General’s definitive stance, dozens of law enforcement agencies have signaled their intent to continue defying the law by sharing ALPR information with law-enforcement agencies of states with restrictive abortion laws, putting abortion seekers and providers at risk.

  • ENCRYPTIONFighting European Threats to Encryption: 2023 Year in Review

    By Christoph Schmon, Joe Mullin, and Paige Collings

    Private communication is a fundamental human right. In the online world, the best tool we have to defend this right is end-to-end encryption. Yet throughout 2023, politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures.

  • PRIVACYEFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

    The Electronic Frontier Foundation (EFF) last week asked the Supreme Court to overturn a ruling undermining Fifth Amendment protections against self-incrimination and find that constitutional safeguards prevent police from forcing people to provide or use passcodes for their cell phones so officers can access the tremendous amount of private information on phones.

  • SURVEILLANCEAbuse-Resistant Digital Surveillance

    Digital surveillance of suspects must be silent so as not to alert them. However, systems currently in use lack stringent technical mechanisms to ensure the legality of these measures. Security protocols to make legally required monitoring of digital communications more resistant to misuse and mass surveillance.

  • CYBERSECURITYFrom ********* to EZacces$! Your Browser Extension Could Grab Your Password and Sensitive Info

    By Jason Daley

    When you type a password or credit card number into a website, you expect that your sensitive data will be protected by a system designed to keep it secure. That’s not always the case.

  • AIBiden Administration Executive Order Tackles AI Risks, but Lack of Privacy Laws Limits Rach

    By Anjana Susarla

    The comprehensive, even sweeping, set of guidelines for artificial intelligence that the White House unveiled in an executive order on Oct. 30, 2023, show that the U.S. government is attempting to address the risks posed by AI. The order is only a step, however, and it leaves unresolved the issue of comprehensive data privacy legislation.

  • SURVEILLANCE“Surveillance: From Vision to Data” Explores History of Surveillance

    The term surveillance may suggest images of high-tech cameras or George Orwell’s ever-watching Big Brother, but surveillance involves more than watching and being watched. To understand surveillance and its consequences, look to data: who collects it, what information is compiled, how it is interpreted, and ultimately, why it matters.

  • SURVEILLANCEAdtech Surveillance and Government Surveillance are Often the Same Surveillance

    By Matthew Guariglia

    In the absence of comprehensive federal privacy legislation in the United States, the targeted advertising industry, fueled by personal information harvested from our cell phone applications, has run roughshod over our privacy.

  • ARGUMENT: DHS & AUTOMATED SYSTEMSDHS Must Evaluate and Overhaul its Flawed Automated Systems

    DHS is likely the single largest collector and consumer in the U.S. government of detailed, often intimate, information about Americans and foreigners alike. Rachel Levinson-Waldman and José Guillermo Gutiérrez write that “these systems and the data that powers them operate behind a veil of secrecy, with little meaningful documentation about how they work, and are too often deployed in discriminatory ways that violate Americans’ constitutional rights and civil liberties.”

  • SURVEILLANCEThere’s a Cop in My Pocket: Policymakers Need to Stop Advocating Surveillance by Default

    By Tarah Wheeler and Geoffrey Cain

    All this year, U.S. leaders have attempted to pass a wave of misguided online security bills, designed to break that encryption and place Americans in a panopticon of surveillance by default. Encryption, cybersecurity, and technology policies, like the RESTRICT and EARN-IT Acts, with nonexistent tradeoffs address symptoms, not problems, and they do it badly.  

  • TRANSPORTATION SECURITYThe Impending Privacy Threat of Self-Driving Cars

    By Matthew Guariglia

    With innovations often come unintended consequences—one of which is the massive collection of data required for an autonomous vehicle to function. The sheer amount of visual and other information collected by a fleet of cars traveling down public streets conjures the threat of the possibility for peoples’ movements to be tracked, aggregated, and retained by companies, law enforcement, or bad actors—including vendor employees.

  • ENCRYPTIONThe U.K. Government Is Very Close to Eroding Encryption Worldwide

    By Joe Mullin

    The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption. If it passes, the Online Safety Bill will be a huge step backwards for global privacy, and democracy itself.

  • DATA PRIVACYA New Way to Look at Data Privacy

    By Adam Zewe

    Researchers create a privacy technique that protects sensitive data while maintaining a machine-learning model’s performance. The researchers created a new privacy metric, which they call Probably Approximately Correct (PAC) Privacy, and built a framework based on this metric that can automatically determine the minimal amount of noise that needs to be added.

  • AIHow an “AI-tocracy” Emerges

    By Peter Dizikes

    Many scholars, analysts, and other observers have suggested that resistance to innovation is an Achilles’ heel of authoritarian regimes. But in China, the use of AI-driven facial recognition helps the regime repress dissent while enhancing the technology, researchers report.