• British Documentary Alleges China Influences Universities, Spies on Hong Kongers in UK

    A BBC Channel 4 documentary claims the Chinese government is interfering with academic freedom and spying on Hong Kong activists in the United Kingdom. The film also alleges that Chinese government agents pretending to be journalists used fake profiles and avatars to target Hong Kong activists now living in the U.K.

  • Outsourcing Surveillance: A Cost-Effective Strategy to Maintain Maritime Supremacy

    Persistent surveillance is one of the most valuable types of surveillance missions. But, Josh Portzer and Aaron Stein write, “Persistent surveillance is a challenging problem for two reasons: capacity and cost. In today’s budgetary climate, “simply increasing U.S. military capacity is not tenable. [But] by increasing the number of sensors globally, the Department of Defense would not only gain valuable, near-persistent surveillance data in areas of interest at (relatively) affordable prices, but also would enjoy the option of gray-zone operations given the strategic ambiguity that outsourcing provides.”

  • EFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

    The Electronic Frontier Foundation (EFF) last week asked the Supreme Court to overturn a ruling undermining Fifth Amendment protections against self-incrimination and find that constitutional safeguards prevent police from forcing people to provide or use passcodes for their cell phones so officers can access the tremendous amount of private information on phones.

  • Abuse-Resistant Digital Surveillance

    Digital surveillance of suspects must be silent so as not to alert them. However, systems currently in use lack stringent technical mechanisms to ensure the legality of these measures. Security protocols to make legally required monitoring of digital communications more resistant to misuse and mass surveillance.

  • “Surveillance: From Vision to Data” Explores History of Surveillance

    The term surveillance may suggest images of high-tech cameras or George Orwell’s ever-watching Big Brother, but surveillance involves more than watching and being watched. To understand surveillance and its consequences, look to data: who collects it, what information is compiled, how it is interpreted, and ultimately, why it matters.

  • Adtech Surveillance and Government Surveillance are Often the Same Surveillance

    In the absence of comprehensive federal privacy legislation in the United States, the targeted advertising industry, fueled by personal information harvested from our cell phone applications, has run roughshod over our privacy.

  • How Did Israeli Intelligence Miss Hamas’ Preparations to Attack? A U.S. Counterterrorism Expert Explains How Israeli Intelligence Works

    Hamas is on Israel’s doorstep. One would think Israel could better understand what is happening in Gaza and the West Bank, as opposed to 1,000 miles away in Iran. How did Israel not see something this advanced right next door? Some Israeli officials have said they believed Hamas was already deterred by recent Israeli counterterrorism operations, and that the group lacked the capability to launch an attack on the scope and scale of what occurred.

  • Sovereignty in Space

    The EU wants to establish its own satellite network by 2027, with the aim of increasing the resilience of the European communications infrastructure and gaining technological sovereignty in space. Achieving this will require novel solutions.

  • Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

    Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware.

  • There’s a Cop in My Pocket: Policymakers Need to Stop Advocating Surveillance by Default

    All this year, U.S. leaders have attempted to pass a wave of misguided online security bills, designed to break that encryption and place Americans in a panopticon of surveillance by default. Encryption, cybersecurity, and technology policies, like the RESTRICT and EARN-IT Acts, with nonexistent tradeoffs address symptoms, not problems, and they do it badly.  

  • The Scourge of Commercial Spyware—and How to Stop It

    Years of public revelations have spotlighted a shadowy set of spyware companies selling and servicing deeply intrusive surveillance technologies that are used against journalists, activists, lawyers, politicians, diplomats, and others. Democratic nations (thus far) lag behind the United States in executing spyware-related policy commitments.

  • The Impending Privacy Threat of Self-Driving Cars

    With innovations often come unintended consequences—one of which is the massive collection of data required for an autonomous vehicle to function. The sheer amount of visual and other information collected by a fleet of cars traveling down public streets conjures the threat of the possibility for peoples’ movements to be tracked, aggregated, and retained by companies, law enforcement, or bad actors—including vendor employees.

  • Regulate National Security AI Like Covert Action

    Congress is trying to roll up its sleeves and get to work on artificial intelligence (AI) regulation. Ashley Deeks writes that only a few of these proposed provisions, however, implicate national security-related AI, and none create any kind of framework regulation for such tools. She proposes crafting a law similar to the War Powers Act to govern U.S. intelligence and military agencies use of AI tools.

  • How an “AI-tocracy” Emerges

    Many scholars, analysts, and other observers have suggested that resistance to innovation is an Achilles’ heel of authoritarian regimes. But in China, the use of AI-driven facial recognition helps the regime repress dissent while enhancing the technology, researchers report.

  • FireDrone Supports the Firefighters

    Researchers are developing a heat-resistant drone that can analyze the source of danger at close range in the event of a building or forest fire. This allows firefighters to optimize the strategy of a high-risk operation before entering the danger zone.