AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
Highlights:

Just Security’s Artificial Intelligence Archive
Just Security's collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.

AI’s Hidden National Security Cost
Generative AI is being integrated across the federal workplace, but efficiency gains risk weakening national security professionals’ critical thinking and judgment.

Export Controls and U.S. Trade Policy: Making Sense of the New Terrain
The Trump administration's use of export controls as leverage in trade diplomacy creates risks for key U.S. national security interests.

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime
Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats
For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.

Collection: Just Security’s Coverage of Trump Administration Executive Actions
Coverage of key developments, including in concise “What Just Happened” expert explainers, legal and policy analysis, and more. Check back frequently for updates.
1,127 Articles

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity
As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it.

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015
Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security
The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.

A Strategic Bet to Advance America’s Quantum Leadership
By prioritizing quantum sensors, the Trump administration can catalyze defense breakthroughs and secure the U.S. lead in the quantum era.

Dueling Strategies for Global AI Leadership? What the U.S. and China Action Plans Reveal
The U.S.-China AI rivalry raises urgent questions for global stability, intensifying fragmentation, chip chokepoints and global AI governance.

Selling AI Chips Won’t Keep China Hooked on U.S. Technology
Selling American chips alone will not create a lasting “addiction,” but it will provide China with the building blocks for AI competitiveness.

Quantum Supply Chains: A Test Case for a New Economic World Order
Quantum is a test case of a new economic paradigm, in which technological leadership — not market size alone — determines success.

America’s Missile Shield Raises Legal and Cybersecurity Concerns
The Golden Dome raises urgent questions: What are the legal boundaries for weapons in orbit? How can the United States prevent cybersecurity liabilities?

Just Security’s Russia–Ukraine War Archive
A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.

The AI Action Plans: How Similar are the U.S. and Chinese Playbooks?
Despite different rhetoric, Washington's & Beijing's AI Action Plans converge on the need to advance AI adoption, expand diffusion, & manage risks.

Unlocking Justice: A Policy Roadmap for Victims of Spyware
To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?
Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.