Skip to the main content


The Latest

Stories, videos, podcasts, and more from our community of staff, fellows, and affiliates

Open Technology Fund

Examining the Expanding Web of Chinese and Russian Information Controls

Valentin Weber tracks the global diffusion of repressive information controls and techniques

Sep 17, 2019
The Wall Street Journal

Tips for Keeping Your Mobile Phone (Relatively) Safe

You can’t eliminate all the personal data your phone collects and shares about you. But you can limit it.

Sep 17, 2019
Columbia Journalism Review

Source hacking: How trolls manipulate the media

Data & Society report aims to create a taxonomy of trolling tactics.

Sep 12, 2019

What digital nerds and bio geeks have to worry about

As synthetic biology "programming" reaches the complexity of traditional computer programming, the risks of computer systems will transfer to biological systems.

Sep 12, 2019
The New York Times

Host Violent Content? In Australia, You Could Go to Jail

Australia has held itself up as a model for cracking down on violent extremist material online since the Christchurch massacre in New Zealand. But the limits to its approach have…

Sep 11, 2019
The New Yorker

Instagram, Facebook, and the Perils of “Sharenting”

What happens when the slow telos of parenthood meets the insatiable rhythms of social media?

Sep 11, 2019
The Boston Globe

Are you sure you want to post that about your kid on Facebook?

Why oversharing about children today could end up hurting them for years to come.

Sep 10, 2019

Policing User Content on Social Media

Policy experts debate what legal responsibility social media companies should have under the 1996 Communications Decency Act

Sep 6, 2019
The Washington Post

Here’s one more question parents should think about during back-to-school season

We need civics education in schools to build effective democratic citizens, says BKC faculty associate Danielle Allen

Sep 5, 2019
Data & Society

Source Hacking: Media Manipulation in Practice

Data & Society report uses case studies to illustrate four main techniques of source hacking

Sep 4, 2019

Cyber Experts Warn Of Vulnerabilities Facing 2020 Election Machines

Bruce Schneier comments on election security for NPR

Sep 4, 2019
99% Invisible

Wait Wait…Tell Me!

Progress bars on computers manage users’ expectations of waiting

Sep 3, 2019
Harvard Gazette

Harvard students explore ethics in tech

Assembly Student Fellowship convenes students to tackle the biggest issues in tech today.

Sep 1, 2019

The ‘ghost work’ powering tech magic

Armies of workers help power the technological wizardry that is reshaping our lives – but they are invisible and their jobs are precarious.

Sep 1, 2019
The New York Times

Cooking Eggs in the Morning and Shucking Oysters at Night, Thanks to an App

Facing a labor shortage, restaurants are turning to on-demand services for line cooks, dishwashers and other trained workers.

Sep 1, 2019

Emerging Technology & Human Rights

Domain experts from MIT, Harvard, and RightsCon offer insight into the intersection of emerging tech and human rights.

Aug 31, 2019

Teaching Machines to Autonomously Write Stories

An interview with David Weinberger

Aug 30, 2019

Ethical Implications of AI and Ubuntu as an Intervention

BKC fellow proposes guidelines to build better tools that can safeguard society

Aug 29, 2019

The Myth of Consumer Security

The distinction between military and consumer products largely doesn't exist

Aug 26, 2019
Buzzfeed News

With This Statement, I Give Notice That Instagram Owns Your Soul

People posting a pseudo-legal declaration may believe they're in a two-way dialogue with the company. The opposite is true.

Aug 23, 2019