AI & Emerging Technology
Cyber
454 Articles

Balancing Reality and Fear: Why An Alarmist Take on Chinese Influence Operations Is Counterproductive
Five specific reasons not to exaggerate the threat of Chinese cyber influence operations.

Turning Cuba’s Internet Back On: International Legal Options
Top cyber law expert writes that the United States government can restore Internet and social media service to Cuban people under international law.

Encryption Originalism
Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.

The UN Cyber Groups, GGE and OEWG – A Consensus is Optimal, But Time is of the Essence
The UN groups operating in the Field of Information and Telecommunications in the Context of International Security — the Open-Ended Working Group (OEWG) and the UN Governmental…

Three International Law Rules for Responding Effectively to Hostile Cyber Operations
Express endorsement of three legal policy positions would go far in ensuring the door to effective cyber responses is open.

Artificial Intelligence in the Intelligence Community: Money is Not Enough
Congress wants to spend hundreds of billions of dollars on competitiveness in emerging technology, and AI in particular. But spending it effectively requires reforms to the Intelligence…

Holding the LINE: Chinese Cyber Influence Campaigns After the Pandemic
An analysis of China's cyber influence tactics in Taiwan's 2020 elections can help us understand the extent of China’s capabilities and how to prepare for future operations.

Protect Communications Privacy for All of Us—Not Just Lawmakers and Reporters
It’s Time for Congress to Finish What It Started After the Snowden Revelations.

The Internet of Things Moment: My Testimony Before the Senate Judiciary Subcommittee
I was asked to testify at a Senate hearing about home technologies and antitrust. The growth of the consumer-facing “Internet of Things” continues, and it has complicated,…

Why Biden and Putin Should Restart Talks on Strategic Stability and Nuclear Arms Control
Their summit is pivotal to begin reducing the growing risk of nuclear conflict and get back on track to pare excessive, dangerous stockpiles,

Four Key Takeaways from the Senate’s Cybersecurity Confirmation Hearing
There were approximately 65,000 ransomware attacks last year in the United States, and that number doesn’t seem to be slowing down. Over the past few weeks, cybersecurity has…

The Sixth United Nations GGE and International Law in Cyberspace
Top expert analysis of the much-anticipated report that provides consensus views among key States on the application of international law to cyberspace.