Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

Predictive policing tools used widely by law enforcement agencies attempt to identify where crime will happen before it does. These analyses determine police deployment, and ultimately, arrest data. In this article, Ben Winters highlights how risk assessment tools use that data, combined with various other inputs, to determine detention, bail, sentencing, parole, and more which… Continue reading Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community

The next generation of mobile broadband, 5G, is emerging as a major area of competition between the United States and China. 5G technology promises vast improvements not only to the speed of commercial cellular connections, but also to governments’ intelligence, surveillance, and reconnaissance capabilities. Leadership in the development of 5G technology has thus been deemed… Continue reading Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community

Projecting Power: How States Use Proxies in Cyberspace

How and why do states use cyber proxies to project power? Why do some states lean closer to these proxies than others, and what does this distance reveal about how a state views them? In this article, Syed Hamza Mannan answers these questions in a review of Tim Maurer’s book, Cyber Mercenaries: The State, Hackers,… Continue reading Projecting Power: How States Use Proxies in Cyberspace