Aegis
Cybersecurity Under the Ocean: Submarine Cables and US National Security
Submarine cables' security and resiliency are vital to the global internet as we know it—but this infrastructure faces many risks that policymakers must help tackle.
Aegis explores legal and policy issues at the intersection of technology and national security. Published in partnership with the Hoover Institution National Security, Technology and Law Working Group, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford. Aegis examines the legal and policy options that better shield America, its allies, and civilians worldwide from the risks of the modern world. The Hoover Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law.
Submarine cables' security and resiliency are vital to the global internet as we know it—but this infrastructure faces many risks that policymakers must help tackle.
U.S. government access to at least some private market data—and the limiting of foreign access to this same information—is essential for national security.
Can governments purchase user records as an end-run around the warrant requirement imposed by Carpenter v. United States?
What are the legal and policy questions raised by gig surveillance work?
The perils that flow from facial recognition can be mitigated through sensible limits without banning the technology and the risks of facial recognition are less bad than the options police have without its use.
Although law enforcement investigations have always depended on information from private actors, modern technology and big data have transformed an analog collection process into an automated, digital one. This shift has elevated the role that private entities play in the investigative process, mirroring the growth of private influence across the entire criminal system. Many of these private influences have been fiercely criticized.
Policing increasingly relies on the collection of digital data, often of people for whom there is no basis for suspicion. Police seek fewer search warrants and more requests to harvest metadata, they buy data from brokers, they track location and other aspects of our lives. Sometimes police collect the data themselves. More often they gather it from third parties. They do so by purchase, and by court order.
Subscribe to Aegis: Security Policy in Depth via RSS.