AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,137 Articles

No Place to Hide, No Place to Post: Lessons from Recent Efforts at “De-Platforming” ISIS
A recent scramble to reduce or eliminate the presence of ISIS in online platforms suggests that depriving the group of its virtual safe haven on any particular platform may be…

Timeline: Rep. Devin Nunes and Ukraine Disinformation Efforts
Comprehensive chronology of Rep. Devin Nunes and his top aide Derek Harvey's alleged work with Giuliani and indicted businessman Lev Parnas.

National Security at the United Nations This Week
Security Council members condemn US policy shift on Israeli settlements, a Russia-sponsored cyber agreement that could pave the way for more Internet censorship moves forward,…

Evaluating Facebook’s New Oversight Board for Content Moderation
Facebook recently released more details about its Oversight Board, publishing a governing charter in September that describes how the board will review the company’s decisions…

A Dozen Questions for John Solomon
Twelve questions for Solomon who the Post said “played an important role in advancing a flawed, Trump-friendly tale of corruption in Ukraine.”

More or Less Justice? More or Less Security?
Reflecting on what's changed since Just Security launched six years ago, and three challenges that we now confront.

Correcting the Record: Wiretaps, the CLOUD Act, and the US-UK Agreement
Over at Stanford CIS blog, Albert Gidari takes aim at the wiretap-related provisions in the US-UK CLOUD Act Agreement – which Peter Swire and I wrote about separately here. He…

Bill Barr’s Witch Hunt
America’s chief law enforcement officer is using the full power of the U.S. government to pressure foreign governments to engage in investigations designed to politically benefit…

Reassessing U.S. Cyber Operations Against Iran and the Use of Force
"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."

A Fourth Amendment Framework for Voiceprint Database Searches
Voice recognition technology should be subject to a new Fourth Amendment framework, drawing on the Supreme Court’s recent technology-related decisions, that treats each query…

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis
The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…

The UK-US CLOUD Act Agreement Is Finally Here, Containing New Safeguards
Editor’s note: This piece is cross-posted at Lawfare. On Oct. 7, the United Kingdom and the United States released the text of the long-awaited data-sharing agreement—the…