AI & Emerging Technology

Cyber

× Clear Filters
454 Articles
A graphic illustration of Germany with a triangular grid pattern symbolizing virtual connections.

Germany’s Positions on International Law in Cyberspace Part II

Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.
A phone show the Garmin Connect software with an error message that reads, “Server Maintenance: Sorry, we are down for maintenance. Check back shortly.” and “We are currently experiencing an outage that affects Garmin.com and Garmin Connect. This outage also affects our call centers, and we are currently unable to receive any calls, emails, or online chats. We are working to resolve this issue as quickly as possible and apologize for this inconvenience.” A watch that is clearly not working and has a dark screen is shown next to the phone with these messages.

Germany’s Positions on International Law in Cyberspace Part I

Germany issues major statement on cyberspace and international law, analyzed here by leading expert Professor Michael Schmitt.
Norma Rodriguez, mother of Keyla Martinez, a nursing student who died in police custody early on February 7, cries during a press conference at the headquarters of the Committee of Relatives of the Disappeared in Honduras (COFADEH), in Tegucigalpa, on March 4, 2021. She wears a facemask with her daughter’s face and is comforted by two people wearing identical shirts and the same face masks of her daughter.

Taking Gender Into Account to Better Confront New Security Threats

The US needs to move to the next stage in the Women, Peace and Security agenda, and rethink security policy to be more inclusive and equitable.
A view of three speakers on videochat during the Munich Security Conference (MSC) Special Edition: "Beyond Westlessness: Renewing Transatlantic Cooperation, Meeting Global Challenges". A person stands near a podium in front of the screen projector looking at the speakers on screen.

China’s Military Tech Ambitions – What’s the U.S.- EU Gameplan?

The US and EU have taken divergent approaches to Chinese tech advances - including military and dual-use tech. To maintain their alliance, they must synchronize their approach.…
A AFP journalist views a video on January 25, 2019, manipulated with artificial intelligence to potentially deceive viewers, or "deepfake" at his newsdesk in Washington, DC.

Protecting the Information Space in Times of Armed Conflict

What, if any, limits exist concerning digital information operations in armed conflict? Does the humanitarian legal framework adequately capture the protection needs that arise…
An activist of Vesna (Spring) youth movement fills a bag with two thousand paper planes, as a symbol of Telegram, during a flash-mob near the Roskomnadzor building in Saint Petersburg on April 13, 2018, as they protest against the blocking of the popular messaging app "Telegram" in Russia, after it refused to give state security services access to private conversations.

Telegram: A Growing Social Media Refuge, for Good and Ill

It is used in some quarters as a tool of constructive political resistance, and in others abused to spread disinformation and illicit content.

KBR v. SFO: the United Kingdom’s Microsoft Ireland?

U.K. law enforcement agencies lack power to compel foreign companies to hand over overseas data. What does the decision mean for data sharing?
The flag of North Korea overlaid on binary numerical code.

The Latest North Korea Cyber Indictment Should Serve as a Model

Last week, the Biden administration’s Department of Justice (DOJ) announced its first major cyber-related indictment. An investigation long in the works, the indictment charges…
A lock highlighted in blue embedded on a computer chip has numbers written all over it.

A Key Step in Preventing a Future SolarWinds

Federal action is needed to establish a cloud security certification that can applies across the ecosystem of information and communications technology.
A 3D illustration of binary numbers in blue waves. The numbers look like electronic lights.

SolarWinds as a Constitutive Moment: A New Agenda for the International Law of Intelligence

The SolarWinds hack could trigger fundamental changes in legal thought and state practice. Asaf Lubin sets out what that agenda can and should look like.
A SolarWinds sign and logo sits on top of the SolarWinds office building in Brno in the Czech Republic.

Top Expert Backgrounder: Russia’s SolarWinds Operation and International Law

A legal analysis of whether the SolarWinds cyber hack violated international law, and the U.S. government's response options.
Trump and Putin’s silhouettes as they walk side-by-side.

“Strategic Silence” and State-Sponsored Hacking: The US Gov’t and SolarWinds

The absence to date of executive branch attribution and condemnation of the SolarWinds intrusions may be strategic silence—a tactic employed in the immediate aftermath of past…
1-12 of 454 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: