AI & Emerging Technology

Cyber

× Clear Filters
454 Articles
Binary code in blue on a blue and black background

The Defense Department’s Measured Take on International Law in Cyberspace

A close reading of the Defense Department's statement on cyber by top expert, comparing it to positions of Australia, France, Netherlands, United Kingdom and others.

Why the 2020 Election Will Be A Mess Part II: Beyond Russian Disinformation

As anger in the U.S. grows, the threat of political violence also builds, providing the Russian government another opportunity to divide the country.
A 3-D rendering of the country Georgia

Russian Cyber Attacks Against Georgia, Public Attributions and Sovereignty in Cyberspace

"The attack on Georgia shows the opportunity costs of states not firmly grounding their reactions in the language of international law."
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Md. U.S. Army Cyber Command. The room is covered with computer screens on desks as well as larger screens on the front wall. Each soldier appears to have three screens to their self.

Norm-Skepticism in Cyberspace? Counter-Factual and Counterproductive

Leading expert on international law and cyber responds to statement by Chief of US Naval Operations, Admiral Mike Gilday on international norms in cyberspace.
A man uses a smartphone while speaking with another riding a motorcycle along the side of a street in the Iranian capital Tehran on November 23, 2019.

For Free Expression in Iran, the U.S. Can Act to Keep the Internet On

The US should allow American companies to provide technology services and platforms to the Iranian people without fear of violating sanctions.
Voters cast their ballots on Election Day November 04, 2008, at Centreville High School in Clifton, Virginia.

Why the 2020 Election Will Be A Mess: It’s Just Too Easy for Putin

The 2020 election cycle will provide the Kremlin opportunities to pursue further subversion, disinformation, and deception.
Carl Voss, Des Moines City Councilman and a precinct chair, returns to his car after he unsuccessfully attempted to drop off a caucus results packet from Precinct 55 at the Iowa Democratic Party headquarters February 4, 2020 in Des Moines, Iowa. He is surrounded by reporters.

The Simple Lessons from a Complicated Iowa Caucus

There's a role for everyone in ensuring the accuracy and reliability of election results -- states, Congress and the public.
Abstract Background - Cyber Internet

Punching on the Edges of the Grey Zone: Iranian Cyber Threats and State Cyber Responses

Retired Colonel Gary Corn, a former senior JAG at U.S. Cyber Command, discusses broader legal international norms to counter Iran and other states’ malicious cyber activities.…
A wide view of the Security Council as Ghassan Salamé (on screen), Special Representative of the Secretary-General and Head of the United Nations Support Mission in Libya (UNSMIL), briefs the Council meeting on the situation in Libya. 30 January 2020

National Security at the United Nations This Past Week

Editor’s Note: This is the latest in Just Security’s weekly series keeping readers up to date on developments at the United Nations at the intersection of national security,…
Senate Judiciary Committee member Sen. Amy Klobuchar (D-MN) displays an inaccurate Tweet telling voters to cast ballots with text messages while she questions witnesses from Google, Facebook and Twitter during a Crime and Terrorism Subcommittee hearing in the Hart Senate Office Building on Capitol Hill October 31, 2017 in Washington, DC.

As Election Primaries Approach, Red Flags Signal Voter Suppression Risks

Voter suppression tactics are as old as American democracy. But new technology has catapulted this threat to the next level, arming foreign governments and domestic disinformation…
World Map

The Application of International Law to Cyberspace: Sovereignty and Non-intervention

A new Chatham House Report discusses how key international law principles apply to States’ cyber operations below the threshold of use of force and makes recommendations to governments…
Social Media Apps on a Phone: Twitter, Messenger, telegram, Google+, Gmail, Instagram, and Snapchat

No Place to Hide, No Place to Post: Lessons from Recent Efforts at “De-Platforming” ISIS

A recent scramble to reduce or eliminate the presence of ISIS in online platforms suggests that depriving the group of its virtual safe haven on any particular platform may be…
1-12 of 454 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: