Transparency is central to the prevention of human rights abuses. Over the past few decades, a belief in transparency has permeated multiple industries, reflected in an explosion of legislation intended to further this principle. Yet, despite this emphatic recognition of the importance of transparency, the activities of government and private sector actors involved in the development, sale, and export of Offensive Cyber Capabilities (OCC) remain cloaked in secrecy regardless of the sector’s role in facilitating human rights abuses. In this article, we tackle this broader challenge of secrecy via a case study on the export of dual-use technologies. We theorize why secrecy has been so prevalent in the OCC sector. We consider the role of diffe...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering,...
International audienceAfter decades of digitalization spreading into every area of our lives, with v...
Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, rese...
What kinds of politics do export controls entail and whose rights do they enable? The following arti...
Export of cyber technology can undermine human rights in countries of destination. In the aftermath ...
It is no secret that technology companies have greased the wheels for human rights abuses around the...
Machiko Kanetake This chapter is based on the following publication by the author: ‘The EU’s Dual-Us...
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smart...
This dissertation examines the controversy about the disclosure and sale of software vulnerabilities...
In his Fable titled ‘the Tree and the Reed’, Aesop’s moral is that “Obscurity often brings safety”. ...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
This article develops an ‘economy of secrecy’ as a framework to understand how secrecy regulates int...
Reprinted in Bernard I. Finel & Kristen M. Lord, eds. (2000). Power and conflict in the age of trans...
This paper challenges the effectiveness and necessity of “mass surveillance technology”(MST) on two ...
The article examines reporting laws to determine if and how these laws shape corporate conduct and p...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering,...
International audienceAfter decades of digitalization spreading into every area of our lives, with v...
Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, rese...
What kinds of politics do export controls entail and whose rights do they enable? The following arti...
Export of cyber technology can undermine human rights in countries of destination. In the aftermath ...
It is no secret that technology companies have greased the wheels for human rights abuses around the...
Machiko Kanetake This chapter is based on the following publication by the author: ‘The EU’s Dual-Us...
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smart...
This dissertation examines the controversy about the disclosure and sale of software vulnerabilities...
In his Fable titled ‘the Tree and the Reed’, Aesop’s moral is that “Obscurity often brings safety”. ...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
This article develops an ‘economy of secrecy’ as a framework to understand how secrecy regulates int...
Reprinted in Bernard I. Finel & Kristen M. Lord, eds. (2000). Power and conflict in the age of trans...
This paper challenges the effectiveness and necessity of “mass surveillance technology”(MST) on two ...
The article examines reporting laws to determine if and how these laws shape corporate conduct and p...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering,...
International audienceAfter decades of digitalization spreading into every area of our lives, with v...
Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, rese...