-
Published in: openSecurityGlobal war and the state of exception
As David Miranda's recent detention illustrates, where states once introduced exceptional legislative measures in...
-
Published in: openSecurityDrone technology: the humanitarian potential
Will drones be added to the arsenal of tools available in humanitarian and peacekeeping operations?
-
Published in: openSecurityData, the new conflict resource
Forget blood diamonds. There's a new resource being mined and exploited in the developing world: data.
-
Published in: HomeThe NSA isn’t the only US government agency making privacy obsolete
Increasingly, the relationship between Americans and their government has come to resemble a one-way mirror dividing...
-
Published in: openSecurityThe surveillance marketplace
Behind Google and Verizon lies a much more complex landscape of American companies ready to do global business...
-
Published in: Can Europe Make It?The digital freedom risk: too fragile an acknowledgment
At least at first, freedom dies without human beings being physically hurt. The author is convinced that the freedom...
-
Published in: HomeWelcome to post-Constitution America
What if your country begins to change and nobody notices? As the weaponry and technology of war came home, so did a...
-
Published in: HomeHow to be a rogue superpower
It hardly matters under what label - including American “safety” and “security” - such a governing power is built;...
-
Published in: openDemocracyUKOrwell is drowning in data: the volume problem
In the Orwellian imagination, the fundamental flaw in state intrusion lay in overwhelming layers of bureaucracy. Dom...
-
Published in: HomeSurveillance blowback: the making of the US surveillance state, 1898-2020
For well over a century, what might be called ‘surveillance blowback’ from America’s wars has ensured the creation...