Connectivity Theresa May Wants to End “Safe Spaces” for Terrorists on the Internet. What Does That Even Mean? In the wake of the U.K.’s most recent terrorist attacks, its prime minister is talking tough on Internet regulation, but what she’s suggesting is impractical. by Michael Reilly 2017-06-05T15:55:00-04:00
Connectivity The U.K. Pleads with Congress to Change an Outdated Privacy Law to Help Fight Terrorism Updating the Electronic Communications Privacy Act, which governs law enforcement access to data, would also help U.S. investigators. by Mike Orcutt 2017-05-26T16:30:00-04:00
Connectivity Tech Giants Are Joining Forces to Battle Terrorists’ Content A centralized database will allow the likes of Facebook, Twitter, and YouTube to block video posted by violent extremists across multiple sites. by Jamie Condliffe 2016-12-06T10:05:00-05:00
Connectivity White House Hopes More Companies Follow Google in Using Ad Tech Against ISIS Bombs, bullets, and online ads—the tools of modern warfare. by Tom Simonite 2016-09-15T15:19:00-04:00
Connectivity Facebook and Google May Be Fighting Terrorist Videos with Algorithms Silicon Valley companies have come under fire for not doing enough to fight terrorism, but a new report suggests that’s starting to change. by Jamie Condliffe 2016-06-27T00:00:00-04:00
Connectivity Can a Social-Media Algorithm Predict a Terror Attack? Researchers unpacked how terrorists use social media, then built an algorithm that could help us predict future events. by Catherine Caruso 2016-06-16T14:00:00-04:00
Connectivity The Feds Are Wrong to Warn of “Warrant-Proof” Phones Throughout history, communications have mainly been ephemeral. We need to be sure we can preserve that freedom. by Woodrow Hartzog 2016-03-17T00:00:00-04:00
Connectivity Head of British Intelligence Agency on Apple, Snowden, and Regrets The Snowden revelations and other missteps have harmed government relations with technology companies. Now the director of Britain’s GCHQ intelligence agency hopes to patch things up. by Brian Bergstein 2016-03-11T15:04:00-05:00
Connectivity Machine-Learning Algorithm Aims to Identify Terrorists Using the V Signs They Make Terrorists often use masks, scarfs, and hoods to hide their identities. But a new approach aims to distinguish them using the shape of their fingers when they make the “V for victory” sign. by Emerging Technology from the arXiv 2016-03-08T12:17:00-05:00
Connectivity DoJ to Apple: Unlocking That iPhone Won’t Set a Legal Precedent Apple could unlock the San Bernardino shooter’s iPhone without creating a legal precedent that it must help investigators, a government lawyer says. by Tom Simonite 2016-03-01T19:50:00-05:00