382 results for search: %EB%82%A8%EA%B5%AC%ED%9C%B4%EA%B2%8C%ED%85%94%E3%81%ACjusobot%E3%80%81%EF%BD%830m%E2%99%99%EB%82%A8%EA%B5%AC%EA%B1%B4%EB%A7%88%E2%99%A9%EB%82%A8%EA%B5%AC%EC%97%85%EC%86%8C%E2%9C%88%EB%82%A8%EA%B5%AC%EB%A6%BD%EB%B0%A9%20%EB%82%A8%EA%B5%AC%EB%8B%AC%EB%A6%BC/feed/content/colombia/SV-report_2011-04-26.pdf
Without Encryption, My Work Wouldn’t Be Possible
Structural Zero Issue 03
August 24, 2025
Part Three of Our Three-Part “Gathering the Data” Series. Read part one and part two.
In computer security, “security” is always relative to something. What are we actually defending against, and how are we doing it? This is our “threat model.”
My colleagues and I have been using scientific tools to analyze evidence of human rights abuses, including using statistics to uncover mass graves in Mexico and analyzing under-reported police homicides in the United States.
Our work isn’t always popular. It can infuriate those in power who want to cover up incriminating truths about the ...
How LLMs Made the Police Records Access Project Possible
When the Right to Know Act made hundreds of thousands of police records available, HRDAG joined a coalition of organizations to build a database of law enforcement records.
