-
SURVEILANCESpyware Is Spreading Far Beyond Its National-Security Role
Spyware is increasingly exploited by criminals or used to suppress civil liberties, and this proliferation is in part due to weak regulation.
-
-
SURVEILANCEThe U.K. Demands for Apple to Break Encryption Is an Emergency for Us All
The United Kingdom is demanding that Apple create an encryption backdoor to give the government access to end-to-end encrypted data in iCloud. Encryption is one of the best ways we have to reclaim our privacy and security in a digital world filled with cyberattacks and security breaches, and there’s no way to weaken it in order to only provide access to the “good guys.”
-
-
SPCAE SECURITYMonitoring Space Traffic
AeroAstro Ph.D. student Sydney Dolan uses an interdisciplinary approach to develop collision-avoidance algorithms for satellites.
-
-
DRONESBackgrounder: Drone Operations in the U.S.
More than 1.7 million drones are registered for commercial and recreational use in the United States, and it is safe to assume that there are many additional unregistered drones out there.
-
-
PRIVACYEFF Tells the Second Circuit a Second Time That Electronic Device Searches at the Border Require a Warrant
The number of warrantless device searches at the border and the significant invasion of privacy they represent is only increasing. In Fiscal Year 2023, U.S. Customs and Border Protection (CBP) conducted 41,767 device searches.
-
-
INTELLIGENCE FAILURESThe October 7 Attack: An Assessment of the Intelligence Failings
Hours after the Hamas attack of October 7 began, they were widely attributed to an apparent Israeli intelligence failure, with pundits pointing to several possible sources, including a misunderstanding of Hamas’ intentions, cognitive biases, and an overreliance on the country’s technological superiority. Building on previous literature on surprise attacks and intelligence failures to examine both Israel’s political level and intelligence level prior to October 7, 2023, the findings suggest that the attack was likely not the result of a single glaring failure but rather the accumulation of several problems at both levels.
-
-
SURVEILLANCEWeak "Guardrails" on Police Face Recognition Use Make Things Worse
Police use of face recognition technology (FRT) poses a particularly massive risk to our civil liberties, particularly for Black men and women and other marginalized communities.
-
-
HOME SURVEILLANCEStudy: AI Could Lead to Inconsistent Outcomes in Home Surveillance
Researchers find large language models make inconsistent decisions about whether to call the police when analyzing surveillance videos.
-
-
SURVEILLANCE'Significant' Risks as Facial Recognition in Russia's Subways Goes Regional
In a move that human rights advocates warn carries potential risks for civil rights, Russia has begun expanding its facial-recognition payment system for subways to six cities outside of Moscow.
-
-
CHINA WATCHChina May Be Putting the Great Firewall into Orbit
The first satellites for China’s ambitious G60 mega-constellation are in orbit in preparation for offering global satellite internet services—and we should worry about how this will help Beijing export its model of digital authoritarianism around the world.
-
-
SURVEILLANCEHow Smart Toys May e Spying on Kids: What Parents Need to Know
Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children.
-
-
AITo Win the AI Race, China Aims for a Controlled Intelligence Explosion
China’s leader Xi Jinping has his eye on the transformative forces of artificial intelligence to revolutionize the country’s economy and society in the coming decades. But the disruptive, and potentially unforeseen, consequences of this technology may be more than the party-state can stomach.
-
-
SURVEILLANCEData Privacy After Dobbs: Is Period Tracking Safe?
Many people think all health care information is protected under the federal privacy law, known as HIPAA. But menstrual cycle tracking apps, along with other health care technologies, like texting platforms that patients can use with doctors, are not. There haven’t been any cases where a menstrual tracking app’s data has been subpoenaed yet, but that’s probably due to the slow speed of which cases proceed through the court system.
-
-
SURVEIILANCEDetroit Takes Important Step in Curbing the Harms of Face Recognition Technology
In a first-of-its-kind agreement, the Detroit Police Department recently agreed to adopt strict limits on its officers’ use of face recognition technology as part of a settlement in a lawsuit brought by a victim of this faulty technology.
-
-
TECH COMPANIES & BORDER SECURITYHundreds of Tech Companies Want to Cash In on Homeland Security Funding. Here's Who They Are and What They're Selling.
Whenever concerns grow about the security along the U.S.-Mexico border and immigration, the U.S. government generate dollars — hundreds of millions of dollars — for tech conglomerates and start-ups. Who are the vendors who supply or market the technology for the U.S. government’s increasingly AI-powered homeland security efforts, including the so-called “virtual wall” of surveillance along the southern border with Mexico?
-
More headlines
The long view
DRONESBackgrounder: Drone Operations in the U.S.
More than 1.7 million drones are registered for commercial and recreational use in the United States, and it is safe to assume that there are many additional unregistered drones out there.