How RightsCon brings press freedom, technology and social change together
This week in San Francisco, CPJ's Technology and Advocacy teams will participate in RightsCon 2016, an annual conference focusing on human rights and techno…
This week in San Francisco, CPJ's Technology and Advocacy teams will participate in RightsCon 2016, an annual conference focusing on human rights and techno…
Today, Irish people are commemorating the 1916 Easter Rising, the failed rebellion that led a few years later to Irish independence. Here’s what you need to kno…
Dani Rodrik is the Ford Foundation professor of political economy at the John F. Kennedy School. His recent book, “Economics Rules: The Rights and Wrongs of the…
Last week, at an event co-hosted by Just Security and NYU’s Brennan Center for Justice, the NSA’s Civil Liberties and Privacy Director Rebecca Richards dropped…
The terrorist attacks in Paris and Brussels highlight an important dilemma for the European Union. Over the past two decades, the E.U. has made it much easier f…
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous we…
Secretary of State John Kerry announced on March 17 that, in his judgment, ISIL is committing genocide against a number of minority groups in Syria and Iraq, in…
In August 2015, I had the good fortune to present at the New York State Emergency Management Certification and Training (EMC&T) Academy in Albany, NY. The…
As Americans learn more about instances of police abuses, police cameras are having an increasingly profound influence on how the public views encounters betwee…
If you’ve been paying attention to the fight between Apple and the FBI over the San Bernardino shooter’s iPhone, you’ve probably heard the term “warrant-proof p…
Bitcoin, the decentralised, mainly digital currency that is neither issued nor guaranteed by central banks, has always seemed like a magic trick. Rather than sp…
More nations in the Asia-Pacific are adopting a bottom-up approach to cybersecurity regulation. That’s a good thing, Scott Shackelford writes. Cybersecurity is…