AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles
A collage of Jim Jordan speaking on multiple news channels.

Timeline: Rep. Jim Jordan, a Systematic Disinformation Campaign, and January 6

Starting in August 2020, Jim Jordan's coordinated effort to shape Trump supporters' belief in a stolen presidential election and January 6 as the "ultimate date of significance"…
A Yemeni man looks at graffiti protesting against US drone strikes on September 19, 2018 in Sana'a, Yemen.

Embedding Gender in International Humanitarian Law: Is Artificial Intelligence Up to the Task?

The laws of war can sanction uses of force with gendered consequences. Encoding IHL principles into AI systems may reinforce - or correct for - these disparate impacts.
Russian President Vladimir Putin greets US President Joe Biden with a handshake during the US - Russia Summit 2021 at the La Grange Villa near the Geneva Lake, on June, 16, 2021, in Geneva, Switzerland.

International Law’s Role in Combating Ransomware?

International law has an important role to play in cyberspace, but with regard to the ostensible rules of sovereignty and cyber due diligence, the United States should continue…
A graphic design of a person or android’s head in blue covered in lights depicting coding. Binary numbers run up and down the side of the page next to the person.

Artificial Intelligence in the Intelligence Community: Culture is Critical

The US intelligence community must prioritize addressing its own internal culture in order to engage effectively in the global AI race.
A poster showing six wanted Russian military intelligence officers is displayed before a news conference at the Department of Justice, on October 19, 2020 in Washington, DC.

Cybercrime is Dangerous, But a New UN Treaty Could Be Worse for Rights

First proposed by Russia, this dangerous proposal has gained enough support at the United Nations for negotiations to begin early next year.
A students carries bags and luggage across the main gate as they leave as directed by authorities of the University of Lagos to halt the spread of Covid-19 on Campus in Yaba, Lagos, on July 15, 2021. Some students wear masks.

Living with Two Pandemics: COVID-19 Amid Insecurity in Nigeria

Vaccinations remain in single digits, even as multiple types of violence spread. Yet international aid stands at 20 percent of the need.

Jan 6 Select Committee and Social Media Companies: 10 Key Pieces of Information to Subpoena

The Select Committee should request—better yet, subpoena—the following information from social media companies including Facebook, YouTube, Twitter, Parler, and TikTok.
A phone showing app icons for WeChat and TikTok. An American flag and Chinese flag are in the background behind the phone.

Balancing Reality and Fear: Why An Alarmist Take on Chinese Influence Operations Is Counterproductive

Five specific reasons not to exaggerate the threat of Chinese cyber influence operations.
A long list blown up in poster size of "public complaints" against Facebook policies, including the social media giant's political stances, data security lapses, politicization, privacy violations and misinformation, is taped to the outside of their office building during a protest led by the organization Public Citizen in Washington, DC, May 25, 2021.

Facebook’s New Dangerous Individuals and Organizations Policy Brings More Questions Than Answers

The company has responded to criticism with clarifications and revisions, but the rules require a fundamental rethink.
Cubans are seen outside Havana's Capitol during a demonstration against the government of Cuban President Miguel Diaz-Canel in Havana, on July 11, 2021.

Turning Cuba’s Internet Back On: International Legal Options

Top cyber law expert writes that the United States government can restore Internet and social media service to Cuban people under international law.
A cylindrical cipher device.

Encryption Originalism

Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.
A meeting of the UN Open-Ended Working Group on developments in the field of information and telecommunications in the context of international security.

The UN Cyber Groups, GGE and OEWG – A Consensus is Optimal, But Time is of the Essence

The UN groups operating in the Field of Information and Telecommunications in the Context of International Security — the Open-Ended Working Group (OEWG) and the UN Governmental…
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: