AI & Emerging Technology

Cyber

× Clear Filters
454 Articles
A phone showing app icons for WeChat and TikTok. An American flag and Chinese flag are in the background behind the phone.

Balancing Reality and Fear: Why An Alarmist Take on Chinese Influence Operations Is Counterproductive

Five specific reasons not to exaggerate the threat of Chinese cyber influence operations.
Cubans are seen outside Havana's Capitol during a demonstration against the government of Cuban President Miguel Diaz-Canel in Havana, on July 11, 2021.

Turning Cuba’s Internet Back On: International Legal Options

Top cyber law expert writes that the United States government can restore Internet and social media service to Cuban people under international law.
A cylindrical cipher device.

Encryption Originalism

Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.
A meeting of the UN Open-Ended Working Group on developments in the field of information and telecommunications in the context of international security.

The UN Cyber Groups, GGE and OEWG – A Consensus is Optimal, But Time is of the Essence

The UN groups operating in the Field of Information and Telecommunications in the Context of International Security — the Open-Ended Working Group (OEWG) and the UN Governmental…
Biden and Putin sit in chairs in front of the American and Russian flags in a library. June 16, 2021

Three International Law Rules for Responding Effectively to Hostile Cyber Operations

Express endorsement of three legal policy positions would go far in ensuring the door to effective cyber responses is open.
Abstract Background - Cyber Internet

Artificial Intelligence in the Intelligence Community: Money is Not Enough

Congress wants to spend hundreds of billions of dollars on competitiveness in emerging technology, and AI in particular. But spending it effectively requires reforms to the Intelligence…
A depiction of network circles that change color as they are infected with a virus. The background shows letters and numbers as if it were computer coding.

Holding the LINE: Chinese Cyber Influence Campaigns After the Pandemic

An analysis of China's cyber influence tactics in Taiwan's 2020 elections can help us understand the extent of China’s capabilities and how to prepare for future operations.
A person types on a laptop. Translucent icons litter the image to represent cybersecurity.

Protect Communications Privacy for All of Us—Not Just Lawmakers and Reporters

It’s Time for Congress to Finish What It Started After the Snowden Revelations.
The dome of the US Capitol Building against a blue sky.

The Internet of Things Moment: My Testimony Before the Senate Judiciary Subcommittee

I was asked to testify at a Senate hearing about home technologies and antitrust. The growth of the consumer-facing “Internet of Things” continues, and it has complicated,…
Peace activists wearing masks of Putin and Biden pose with mock nuclear missiles in front of the US embassy in Berlin on January 29, 2021 in an action to call for more progress in nuclear disarmament. One activist holds a sign reading, “Treaty between the United States of America and the Russian Federation on Measures for Further Reduction and Limitation of Strategic Offensive Arms.”

Why Biden and Putin Should Restart Talks on Strategic Stability and Nuclear Arms Control

Their summit is pivotal to begin reducing the growing risk of nuclear conflict and get back on track to pare excessive, dangerous stockpiles,
Jen Easterly, nominee to be the Director of the Homeland Security Cybersecurity and Infrastructure Security Agency, and Chris Inglis, nominee to be the National Cyber Director, testify during their confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, DC.

Four Key Takeaways from the Senate’s Cybersecurity Confirmation Hearing

There were approximately 65,000 ransomware attacks last year in the United States, and that number doesn’t seem to be slowing down. Over the past few weeks, cybersecurity has…
A 3D hologram of the globe with circles and grids laid over to indicate communications and technology.

The Sixth United Nations GGE and International Law in Cyberspace

Top expert analysis of the much-anticipated report that provides consensus views among key States on the application of international law to cyberspace.
1-12 of 454 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: