States & Localities
-
The Programmable State: The e-CNY and China’s Quest for Smarter Surveillance
China’s digital yuan could set a global precedent for programmable money—and for state-controlled financial surveillance. -
Data Brokerage and the Third-Country National Security Problem
Restricting direct data broker sales to China is a start—but privacy and security controls on personal data must go much broader. -
Should American Spies Steal Commercial Secrets?
U.S. intelligence agencies have never stolen foreign commercial and technology secrets. It’s time to rethink that taboo. -
TechTank: ‘Signalgate’ and the use of commercial apps in government
-
EDNY Opinion in Hasbajrami Undermines FISA 702
A flawed decision muddies the rules governing querying of the FISA Section 702 database. -
First Insights Into the U.S.-U.K. CLOUD Act Agreement
A Justice Department report reflects early success and shortcomings of the agreement, especially around protecting U.S. cybersecurity. -
‘Data Colonialism’ and the Political Economy of Big Tech
A review of Mejias and Couldry, “Data Grab: The New Colonialism of Big Tech and How to Fight Back” (University of Chicago Press, 2024). -
Skirting Judicial Scrutiny by Mooting and Scooting
We rely on providers to resist improper surveillance. The Justice Department uses a “moot and scoot” tactic to hobble this protection. -
District Court Judge Rules FISA 702 Queries Required Warrant
The ruling may encourage inclusion of a warrant requirement for U.S. person queries in next year’s Section 702 reauthorization. -
Systemic Risk Assessments Hold Clues for EU Platform Enforcement
The future of online content regulation might rest on largely overlooked EU-required digital risk assessments. -
Using AI to Improve the Government—Without Violating the Privacy Act
Proper use of AI can transform and improve the federal government. Improper use violates the Privacy Act. -
The ‘Mosaic’ Method and the Value of CIA Names to U.S. Adversaries
It’s a fundamental principle inculcated into CIA officers from day one: individual pieces of information can be combined to provide a picture that discloses sensitive intelligence.