AI & Emerging Technology
Cyber
454 Articles

Locking in Transparency on the Vulnerabilities Equities Process
Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…

Cybersecurity and the 2020 Census: Are We Prepared?
A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

Six Big Takeaways from Mueller’s Indictment of Russian Intel Officers
One of the biggest takeaways from Mueller's indictment? WikiLeaks appears to have been deeply involved in a Russian intelligence operation.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation
A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

Protecting Civilians in Cyberspace: Ideas for the Road Ahead
Distinctions between offline and online conflicts are blurring as tools and tactics deployed in cyberspace trigger real world consequences. In Mexico, for example, commercial spyware…

The Technicolor Zone of Cyberspace, Part 2
What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?

The Technicolor Zone of Cyberspace – Part I
Two leading experts on cyber law analyze the U.K. Attorney General's major speech on international law and cyber, delivered at Chatham House last month.

A Model for Improving Cooperation in Cyber – the Highway Safety Act?
A new piece of bipartisan legislation—the “Enhancing Grid Security through Public-Private Partnerships Act” (HR 5240)—was reported out of the House Energy and Commerce…

United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights
On Wednesday, the United Kingdom’s Attorney General, Jeremy Wright, QC MP, gave a speech at Chatham House on the role of international law in cyberspace. It is the first official…

In Defense of Sovereignty in Cyberspace
This article is the latest in our Fog of Law series that examines the gray zones in international law and conflict that can be exploited by states. The series comes in advance…

The DNC Lawsuit and First Amendment Sensitivities
The First Amendment generally bars civil or criminal liability for publication of truthful material about a matter of public concern. That is true even in the case of stolen information.…

Kompromising Congress?
"Given what appears to be the low level of information security on the Hill, we probably don't need to ask whether such information has been gathered by foreign intelligence services.…