AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles
Myanmar people gather for refreshment at a teashop in Yangon on August 31, 2018 many hangout to chat and browse Facebook with their mobile phones.

So, What Does Facebook Take Down? The Secret List of ‘Dangerous’ Individuals and Organizations

Facebook has been criticized for content it allows. But we should be equally skeptical of what it takes down, and its claimed legal reasoning for removals.
A collage of 4 screenshots from different lectures during AI Symposium. Speakers are shown on screen via Zoom.

Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era

Experts discuss how the law must adapt to promote innovation while addressing serious questions around the development and use of AI.
District Attorney Cyrus R. Vance Jr. of New York County, New York; cyber security fellow Matt Tait of University of Texas at Austin, Texas; Erik Neuenschwander, Manager of User Privacy of Apple, Inc.; Jay Sullivan, Product Management Director for Privacy and Integrity in Messenger of Facebook, Inc. testify during a hearing before Senate Judiciary Committee December 10, 2019 on Capitol Hill in Washington, DC.

Client-Side Scanning: A New Front In the War on User Control of Technology

When technology has expanded to nearly every corner of our lives, how much control should users have over the devices they own?
Dutch Minister of Foreign Affairs Bert Koenders hosts the large international consultations with representatives of the Global Counterterrorism Forum (GCTF) and the Anti ISIS coalition in the fight against terror In The Hague, January 11, 2016. The representatives sit in a large room around tables arranged into a square. Large screens show projections of the minister speaking.

Watchlisting the World: Digital Security Infrastructures, Informal Law, and the “Global War on Terror”

The Global Counterterrorism Forum's new "toolkit" ignores input, tracks US practice to dangerously expand the unaccountable post-9/11 system.
The logos of the U.S. Department of Homeland Security are seen on computer terminals in a training room of the Cyber Crimes Center of the U.S. Immigration and Customs Enforcement October 13, 2009 in Fairfax, Virginia.

Congress Debates Cyber Incident Reporting Deadlines in the NDAA

The next NDAA could require cyber incident reporting for critical cyber infrastructure owners and operators within 24 or 72 hours of the incident.
The outlines of a brain are highlighted in light blue light against a dark blue background with dials, charts, and coding.

Changing the Story: Artificial Intelligence and Patent Eligibility

To solve the problem of patent eligibility for AI inventions, it’s time to talk about AI inventions for the truly revolutionary advances that they are.
U.S. President Joe Biden speaks during a meeting about cybersecurity in the East Room of the White House on August 25, 2021 in Washington, DC. Members of the Biden cabinet, national security team and leaders from the private sector sit around long tables arranged in a circle or square attending the meeting about improving the nation's cybersecurity. Many of the chairs are socially distanced.

US Cybersecurity Has a Metrics Problem. Here’s How to Fix It.

Lawmakers have taken critical steps this year, but the lack of data makes it hard to know whether U.S. cybersecurity is actually improving.
Secretary of Defense Lloyd Austin delivers remarks at the National Security Commission on Artificial Intelligence Global Emerging Technology Summit on July 13, 2021 in Washington, DC.

Artificial Intelligence in the Intelligence Community: Know Risk, Know Reward

For AI, where the risk of inaction can be greater than the risk of action, the IC needs a flexible, strategic risk assessment framework.
Members of the OSCE Parliamentary Assembly Meeting of the Standing Committee sit behins desks with microphones in Vienna, July 5, 2021. They wear face masks.

Appetite for Obstruction: How Autocrats Subvert Democracy’s Infrastructure

Russia's block on a recent human rights meeting is part of a pattern of authoritarian powers rending the fabric of rules-based institutions.
The outside of the building for the Tribunal de Paix de Kalehe. Guards stand in the entryways, some hold guns. A banner hangs over one of the entryways.

Incorporating Digital Technology in the Investigation of International Crimes: Lessons from the Democratic Republic of Congo

Key lessons on incorporating digital evidence of international crimes throughout the justice process and increasing its admissibility in court.
A relative of Ezmarai Ahmadi on September 18, 2021, inspecting the debris of a destroyed vehicle that was damaged in a US drone strike in the Kwaja Burga neighbourhood of Kabul.

The Overhyping of Over the Horizon

It might represent the only option for the US on terrorist threats from Afghanistan, but it will be brute, imperfect military force.
The Senate Subcommittee on Consumer Protection, Product Safety, and Data Security sit at the front of the room at a long podium. Facebook Global Head of Safety Director, Antigone Davis, is seen on a video screen as she testifies remotely on Capitol Hill in Washington, DC, September 30, 2021.

SEC Complaints: Fallout from the Facebook Files – Part 3

The Facebook Files dominated tech industry news in the past week, as whistleblower Frances Haugen testified before Congress, talked with 60 Minutes, and provided a consistent and…
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: