AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,137 Articles

Timeline: Rep. Jim Jordan, a Systematic Disinformation Campaign, and January 6
Starting in August 2020, Jim Jordan's coordinated effort to shape Trump supporters' belief in a stolen presidential election and January 6 as the "ultimate date of significance"…

Embedding Gender in International Humanitarian Law: Is Artificial Intelligence Up to the Task?
The laws of war can sanction uses of force with gendered consequences. Encoding IHL principles into AI systems may reinforce - or correct for - these disparate impacts.

International Law’s Role in Combating Ransomware?
International law has an important role to play in cyberspace, but with regard to the ostensible rules of sovereignty and cyber due diligence, the United States should continue…

Artificial Intelligence in the Intelligence Community: Culture is Critical
The US intelligence community must prioritize addressing its own internal culture in order to engage effectively in the global AI race.

Cybercrime is Dangerous, But a New UN Treaty Could Be Worse for Rights
First proposed by Russia, this dangerous proposal has gained enough support at the United Nations for negotiations to begin early next year.

Living with Two Pandemics: COVID-19 Amid Insecurity in Nigeria
Vaccinations remain in single digits, even as multiple types of violence spread. Yet international aid stands at 20 percent of the need.

Jan 6 Select Committee and Social Media Companies: 10 Key Pieces of Information to Subpoena
The Select Committee should request—better yet, subpoena—the following information from social media companies including Facebook, YouTube, Twitter, Parler, and TikTok.

Balancing Reality and Fear: Why An Alarmist Take on Chinese Influence Operations Is Counterproductive
Five specific reasons not to exaggerate the threat of Chinese cyber influence operations.

Facebook’s New Dangerous Individuals and Organizations Policy Brings More Questions Than Answers
The company has responded to criticism with clarifications and revisions, but the rules require a fundamental rethink.

Turning Cuba’s Internet Back On: International Legal Options
Top cyber law expert writes that the United States government can restore Internet and social media service to Cuban people under international law.

Encryption Originalism
Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.

The UN Cyber Groups, GGE and OEWG – A Consensus is Optimal, But Time is of the Essence
The UN groups operating in the Field of Information and Telecommunications in the Context of International Security — the Open-Ended Working Group (OEWG) and the UN Governmental…