AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,099 Articles
The logo of the Federal Bureau of Investigation (FBI) is seen at the Los Angeles Federal Building after a news conference to provide an update on the investigation into a May 18, 2025, bombing at a fertility clinic in Palm Springs, California, on June 4, 2025, in Los Angeles. Daniel Park, 32 from Washington state, was arrested by the FBI at John F. Kennedy International Airport on June 3, 2025, as he was arriving. He is a suspect in the investigation into the May 18, 2025, bombing at a fertility clinic in Palm Springs, California. (Photo by PATRICK T. FALLON/AFP via Getty Images)

Setting the Record Straight on Nihilistic Violence

Confusion over “nihilistic violence” risks mislabeling attacks, hindering efforts to prevent mass violence by non-ideological subcultures.
Binders of executive orders stacked on a desk.

Collection: Just Security’s Coverage of Trump Administration Executive Actions

Coverage of key developments, including in concise “What Just Happened” expert explainers, legal and policy analysis, and more. Check back frequently for updates.
Close view of quantum components

Intellectual Property within the Quantum Innovation Value Chain

Policymakers must consider how patent strategies should be designed to protect and leverage propriety quantum technology to enable innovation.
Posters are displayed on the ground during a rally in support of the Iranian people and the Women Life Freedom movement

Open-Source Information Provides Powerful Evidence of Gender Crimes in Iran and Beyond

Digital open source data can be ethically deployed to strengthen investigations and prosecutions on gender crimes in Iran and elsewhere.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
US President Donald Trump (L), accompanied by his UAE counterpart Sheikh Mohamed bin Zayed Al Nahyan (C) prepares to board Airforce One in Abu Dhabi

What Comes Next After Trump’s AI Deals in the Gulf

Recent major U.S. chip export deals with the Gulf mark the emergence of a new powerhouse in the AI race.
The headquarters of the US Federal Trade Commission (FTC) in Washington, DC, November 18, 2024. (Photo by ROBERTO SCHMIDT/AFP via Getty Images)

The FTC’s Concerning Inaction on a New Data Protection Law

Inaction on PADFA means that the personal information of U.S. citizens can continue to be transferred to adversarial nations without consequences.
The U.S. Capitol is seen after the House narrowly passed a bill forwarding President Donald Trump's agenda at the U.S. Capitol on May 22, 2025 in Washington, DC. (Photo by Kevin Dietsch/Getty Images)

AI Governance Needs Federalism, Not a Federally Imposed Moratorium

Congress should reject the proposed “AI preemption moratorium.” It is bad policy and is likely unconstitutional under the Tenth Amendment.
Visualization of quantum computing logistics (Getty Images)

U.S.-Allied Militaries Must Prepare for the Quantum Threat to Cryptography

Allied governments must align on quantum countermeasures to protect comms and preserve interoperability. Read the latest in our series, "Governing the Quantum Revolution."
Katherine Keneally and Julia Ebner answer questions at the Calleva-Airey Neave Global Security Seminar Series hosted by Oxford University’s Blavatnik School of Government on May 1, 2025.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis

How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.
1-12 of 1,099 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: