AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles
Voters cast their ballots on Election Day November 04, 2008, at Centreville High School in Clifton, Virginia.

Why the 2020 Election Will Be A Mess: It’s Just Too Easy for Putin

The 2020 election cycle will provide the Kremlin opportunities to pursue further subversion, disinformation, and deception.
Carl Voss, Des Moines City Councilman and a precinct chair, returns to his car after he unsuccessfully attempted to drop off a caucus results packet from Precinct 55 at the Iowa Democratic Party headquarters February 4, 2020 in Des Moines, Iowa. He is surrounded by reporters.

The Simple Lessons from a Complicated Iowa Caucus

There's a role for everyone in ensuring the accuracy and reliability of election results -- states, Congress and the public.
Two girls sit in a north Tehran coffee shop using Facebook on a laptop and looking at a mobile phone on October 13, 2013.

Instagram Content Removals in Iran Highlight Questions Over Facebook’s New Oversight Board

Facebook’s recent release of the bylaws for its new Oversight Board, which will be charged with reviewing takedown decisions by Facebook and Instagram, came on the heels of reports…
Abstract Background - Cyber Internet

Punching on the Edges of the Grey Zone: Iranian Cyber Threats and State Cyber Responses

Retired Colonel Gary Corn, a former senior JAG at U.S. Cyber Command, discusses broader legal international norms to counter Iran and other states’ malicious cyber activities.…
The cap of the United States Capitol Building

Congressional Science and Technology Capacity Must Be Revitalized

The time is now for Congress to build out its own expert capacity so that it can oversee — and, if necessary, try to compensate for the loss of — the highly technical expert…
A wide view of the Security Council as Ghassan Salamé (on screen), Special Representative of the Secretary-General and Head of the United Nations Support Mission in Libya (UNSMIL), briefs the Council meeting on the situation in Libya. 30 January 2020

National Security at the United Nations This Past Week

Editor’s Note: This is the latest in Just Security’s weekly series keeping readers up to date on developments at the United Nations at the intersection of national security,…
Senate Judiciary Committee member Sen. Amy Klobuchar (D-MN) displays an inaccurate Tweet telling voters to cast ballots with text messages while she questions witnesses from Google, Facebook and Twitter during a Crime and Terrorism Subcommittee hearing in the Hart Senate Office Building on Capitol Hill October 31, 2017 in Washington, DC.

As Election Primaries Approach, Red Flags Signal Voter Suppression Risks

Voter suppression tactics are as old as American democracy. But new technology has catapulted this threat to the next level, arming foreign governments and domestic disinformation…
An unarmed Trident II D5 missile launches from the Ohio-class ballistic missile submarine USS Nebraska (SSBN 739) off the coast of San Diego, California, Sept. 4, 2019.

Pentagon Deployment of New, “More Usable” Nuclear Weapon Is a Grave Mistake

DoD now acknowledges it has deployed a new, sea-based nuclear warhead capability. But the administration’s stated rationale for the new weapon is deeply flawed, and the decision…
The White House as seem from outside the West Wing. A guard stands at the entrance.

Timeline: Trump, Giuliani, Biden, and Ukrainegate

A comprehensive chronology of events involving "Ukrainegate" and President Trump and Rudy Giuliani's efforts to persuade the Ukrainian government to investigate former Vice President…
World Map

The Application of International Law to Cyberspace: Sovereignty and Non-intervention

A new Chatham House Report discusses how key international law principles apply to States’ cyber operations below the threshold of use of force and makes recommendations to governments…
Barr and Trump

Barr’s Personal, Ad Hoc Declassification Authority and the Role of Congress

Much of Washington is fixated for varying reasons on the release of the report from Michael Horowitz, the Justice Department’s Inspector General, on the origins of the FBI’s…
Rohingya youth Mohammad Rafiq uses his mobile phone to take photos of a man by his shack at the Kutupalong refugee camp on July 23, 2019.

Social Media Vetting of Visa Applicants Violates the First Amendment

The Knight First Amendment Institute and the Brennan Center for Justice sued the US government to stop social media vetting of visa applicants.
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: