AI & Emerging Technology
Cyber
445 Articles

Vague by Design? The Oversight Board, Meta’s DOI Policy, and the Kolovrat Symbol Decision
The Oversight Board's Kolovrat decision reveals more than a dispute over a symbol—it lays bare the deep fault lines in Meta’s content moderation architecture.

The Real National Security Betrayal Isn’t Who Leaves—It’s What Gets Dismantled
The real national security threat from the Trump administration's civil service purges isn’t who might go rogue—it’s the dismantling of the systems built to prevent betrayal.

The Security Stakes in the Global Quantum Race
By acting early, states can build governance frameworks that support the responsible development and adoption of quantum technologies.

What It Takes to Stop the Next Salt Typhoon
A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Just Security’s Russia–Ukraine War Archive
A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.

Incoming DHS Intelligence Lead Promotes Unlawful Activities
The public, Congress, and the media should insist that the DHS's domestic intelligence practices be sunset, rather than expanded.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming
The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

AI Governance Needs Federalism, Not a Federally Imposed Moratorium
Congress should reject the proposed “AI preemption moratorium.” It is bad policy and is likely unconstitutional under the Tenth Amendment.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order
Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.

Is the U.S. Abandoning the Fight Against Foreign Information Operations?
The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations
Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.