This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Cyber

× Clear Filters
456 Articles
Artificial intelligence security cameras using facial recognition technology are displayed at a stand during the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on October 24, 2018. A few people sit at a small table in the booth chatting while others look at the displays on the walls.

One Thousand and One Talents: The Race for A.I. Dominance

Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…
World Map

The Digital Technology Agenda at the Summit for Democracy

"To combat the digital authoritarian threat, democracies must be rallied around a shared values-based vision of digital society and a joint strategic technology agenda."
A graphic illustration of Germany with a triangular grid pattern symbolizing virtual connections.

Germany’s Positions on International Law in Cyberspace Part II

Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.
A phone show the Garmin Connect software with an error message that reads, “Server Maintenance: Sorry, we are down for maintenance. Check back shortly.” and “We are currently experiencing an outage that affects Garmin.com and Garmin Connect. This outage also affects our call centers, and we are currently unable to receive any calls, emails, or online chats. We are working to resolve this issue as quickly as possible and apologize for this inconvenience.” A watch that is clearly not working and has a dark screen is shown next to the phone with these messages.

Germany’s Positions on International Law in Cyberspace Part I

Germany issues major statement on cyberspace and international law, analyzed here by leading expert Professor Michael Schmitt.
Norma Rodriguez, mother of Keyla Martinez, a nursing student who died in police custody early on February 7, cries during a press conference at the headquarters of the Committee of Relatives of the Disappeared in Honduras (COFADEH), in Tegucigalpa, on March 4, 2021. She wears a facemask with her daughter’s face and is comforted by two people wearing identical shirts and the same face masks of her daughter.

Taking Gender Into Account to Better Confront New Security Threats

The US needs to move to the next stage in the Women, Peace and Security agenda, and rethink security policy to be more inclusive and equitable.
A view of three speakers on videochat during the Munich Security Conference (MSC) Special Edition: "Beyond Westlessness: Renewing Transatlantic Cooperation, Meeting Global Challenges". A person stands near a podium in front of the screen projector looking at the speakers on screen.

China’s Military Tech Ambitions – What’s the U.S.- EU Gameplan?

The US and EU have taken divergent approaches to Chinese tech advances - including military and dual-use tech. To maintain their alliance, they must synchronize their approach.…
A AFP journalist views a video on January 25, 2019, manipulated with artificial intelligence to potentially deceive viewers, or "deepfake" at his newsdesk in Washington, DC.

Protecting the Information Space in Times of Armed Conflict

What, if any, limits exist concerning digital information operations in armed conflict? Does the humanitarian legal framework adequately capture the protection needs that arise…
An activist of Vesna (Spring) youth movement fills a bag with two thousand paper planes, as a symbol of Telegram, during a flash-mob near the Roskomnadzor building in Saint Petersburg on April 13, 2018, as they protest against the blocking of the popular messaging app "Telegram" in Russia, after it refused to give state security services access to private conversations.

Telegram: A Growing Social Media Refuge, for Good and Ill

It is used in some quarters as a tool of constructive political resistance, and in others abused to spread disinformation and illicit content.

KBR v. SFO: the United Kingdom’s Microsoft Ireland?

U.K. law enforcement agencies lack power to compel foreign companies to hand over overseas data. What does the decision mean for data sharing?
The flag of North Korea overlaid on binary numerical code.

The Latest North Korea Cyber Indictment Should Serve as a Model

Last week, the Biden administration’s Department of Justice (DOJ) announced its first major cyber-related indictment. An investigation long in the works, the indictment charges…
A lock highlighted in blue embedded on a computer chip has numbers written all over it.

A Key Step in Preventing a Future SolarWinds

Federal action is needed to establish a cloud security certification that can applies across the ecosystem of information and communications technology.
A 3D illustration of binary numbers in blue waves. The numbers look like electronic lights.

SolarWinds as a Constitutive Moment: A New Agenda for the International Law of Intelligence

The SolarWinds hack could trigger fundamental changes in legal thought and state practice. Asaf Lubin sets out what that agenda can and should look like.
1-12 of 456 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: