This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Cyber

× Clear Filters
456 Articles

Exclusive: U.N. Human Rights Experts Meet With Facebook on “Overly Broad” Definitions of Terrorist Content

In a letter to Facebook CEO Mark Zuckerberg, U.N. Special Rapporteur Fionnuala Ní Aoláin says networks guidelines on removing content and users need more precision and rigor…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.

We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Locking in Transparency on the Vulnerabilities Equities Process

Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…

Cybersecurity and the 2020 Census: Are We Prepared?

A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

Six Big Takeaways from Mueller’s Indictment of Russian Intel Officers

One of the biggest takeaways from Mueller's indictment? WikiLeaks appears to have been deeply involved in a Russian intelligence operation.
Locks on $100 bill with an internet browser overlaid.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation

A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

Protecting Civilians in Cyberspace: Ideas for the Road Ahead

Distinctions between offline and online conflicts are blurring as tools and tactics deployed in cyberspace trigger real world consequences. In Mexico, for example, commercial spyware…

The Technicolor Zone of Cyberspace, Part 2

What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?
A graphic design of a person or android’s head in blue covered in lights depicting coding. Binary numbers run up and down the side of the page next to the person.

The Technicolor Zone of Cyberspace – Part I

Two leading experts on cyber law analyze the U.K. Attorney General's major speech on international law and cyber, delivered at Chatham House last month.

A Model for Improving Cooperation in Cyber – the Highway Safety Act?

A new piece of bipartisan legislation—the “Enhancing Grid Security through Public-Private Partnerships Act” (HR 5240)—was reported out of the House Energy and Commerce…

United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights

On Wednesday, the United Kingdom’s Attorney General, Jeremy Wright, QC MP, gave a speech at Chatham House on the role of international law in cyberspace. It is the first official…

In Defense of Sovereignty in Cyberspace

This article is the latest in our Fog of Law series that examines the gray zones in international law and conflict that can be exploited by states. The series comes in advance…
1-12 of 456 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: