AI & Emerging Technology
Cyber
456 Articles

The USA Liberty Act — aka Don’t Let the Constitutional be the Enemy of the Unconstitutional
The House Judiciary Committee has completed its markup of a major surveillance reform bill intended to better protect Americans’ privacy and enhance transparency. Responding…

The Lethal Autonomous Weapons Governmental Meeting (Part I: Coping with Rapid Technological Change)
This week nations meet at the United Nations to discuss lethal autonomous weapon systems (LAWS), including robotic weapons that might hunt for targets on their own. It has been…
Recap of Recent Pieces on Just Security (Oct. 28-Nov. 3)
Cybersecurity and Cyber Conflict Robert S. Taylor, Cyber, Sovereignty, and North Korea–And the Risk of Inaction Michelle Richardson and Mike Godwin, What the White House Needs…

What the White House Needs to Disclose about its Process for Revealing Cybersecurity Vulnerabilities
At a series of events earlier in October, White House Cybersecurity Coordinator Rob Joyce announced that he is preparing to release more information about the Vulnerabilities Equities…

Cyber, Sovereignty, and North Korea–And the Risk of Inaction
Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…

Would the United States Be Responsible for Private Hacking?
Rep. Tom Graves (R-GA) and Rep. Kyrsten Sinema (D-AZ) introduced the Active Cyber Defense Certainty Act (H.R. 4036) in the House of Representatives on Oct. 13. The bill would amend…

It’s Time to Pass Legislation Governing a Key Part of the Government’s Hacking Policy
An example of the splash screen from the Petya malware that was suspected of relying on an exploit developed by the U.S. National Security Agency. It’s well known that government…

Abandoning Iranian Nuclear Deal Could Lead to New Wave of Cyberattacks
Over the last two years, U.S. banks and government agencies have enjoyed a notable respite from malicious Iranian cyber activity. The timing of this drop-off happens to coincide…

Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?
Identifying the legal norms that apply in cyberspace remains highly challenging. The recent collapse of the 5th UN Group of Governmental Experts (GGE) on Developments in the Field…

As Hackers Target U.S. Voting Machines, We Need Leaders Who’ll Put Country Over Party
“If there has ever been a clarion call for vigilance and action against a threat to the very foundation of our democratic political system, this episode is it,” former…

When This Part is Over–America Post the Russia Investigation
At some point, Special Counsel Robert Mueller will complete his investigation. He could bring criminal charges, name other co-conspirators, comment on possible grounds for impeachment,…

Voter Access, Not Voter Fraud, Is A Pressing National Security Issue
The Presidential Advisory Commission on Election Integrity — a body set up by President Donald Trump to investigate “the registration and voting processes used in Federal…