AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,137 Articles

Regulation is Not Enough: A Blueprint for Winning the AI Race
The race for AI supremacy will be determined by innovation, infrastructure, and integration with the private sector.

To Legislate on AI, Schumer Should Start with the Basics
Editor’s Note: This article was cross-posted with Tech Policy Press here. Last Wednesday, Senate Majority Leader Chuck Schumer (D-NY) unveiled his SAFE Innovation Framework,…

The Just Security Podcast: The Proud Boys’ Attack on Pride
The group's ideology depends on narrow constructions of gender and family structure harming those who don’t fit into the mold of a Proud Boy.

Meta’s Oversight Board Recommends Major Advance in International Accountability
The Oversight Board’s recommendation that Meta create a protocol to preserve and share graphic conflict-related content signals that we may be teetering on the edge of a powerful…

Disinformation in a Triple Threat: How Old and New Challenges Make Peacekeeping More Dangerous
As the largest financial contributor – and debtor – to UN peacekeeping, the US is uniquely positioned to reverse the trend.

The Outer Space Treaty and Promoting Responsible Use of Space
States should continue to work on confidence building measures in outer space and should ban anti-satellite tests, which are harmful to humankind.

Cluster Munition Convention Offers Roadmap for New Autonomous Weapons Treaty
Proponents of an autonomous weapons systems treaty should look to the Convention on Cluster Munitions' success for guidance and motivation.

Expert Backgrounder: Title I of the Foreign Intelligence Surveillance Act vs. Section 702
A quick-reference guide to understanding the legal debate about electronic national security surveillance (and how to spot imposters trying to muddy the waters)

“Honey, I’m Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives
States must pay greater attention to adequately preparing military relatives for targeted cyber deception campaigns.

The Just Security Podcast: FISA Section 702 Reauthorization
To understand how the U.S. government thinks about Section 702 reauthorization, Tess Bridgeman sat down with Chris Fonzone and Josh Geltzer.

Spyware Out of the Shadows: The Need for A New International Regulatory Approach
We urgently need a system where the developers of spyware tools are forced either to require their State customers to provide credible guarantees on future human rights compliance,…

Remote Sensing from Space: What Norms Govern?
"If recent excitement about spy balloons is any indication, it may be high time to prioritize a coherent international framework for remote sensing."