AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,137 Articles

One Key Instrument to Confront China and Climate Change
The United States has an opportunity to begin tackling both the security and economic threats posed by China and those posed by climate change, through one action: investing in…

Cyberattack Attribution and the Virtues of Decentralization
In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched…

Top Expert Backgrounder: Aborted U.S. Strike, Cyber Operation Against Iran and International Law
"It is difficult to definitely conclude that the proposed U.S. kinetic strikes would have been valid exercises of self-defense."

When Constitutional Law and Government Hacking Collide: A Landmark U.K. Ruling Is Relevant on Both Sides of the Pond
The U.K. Supreme Court's landmark judgment in R (Privacy International) v Investigatory Powers Tribunal and others sets an important precedent for oversight of questions of law…

Scientists Are Aiding Apartheid in China
The international forensic genetic research community has failed to exercise due diligence in their cooperation with Chinese Ministry of Public Security researchers on forensic…

U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?
Emplacing malware in critical infrastructure on which the civilian population depends is a decision States must not take lightly. It may also violate international law, but 'responding…

Estonia Speaks Out on Key Rules for Cyberspace
Estonian President Kaljulaid stakes out a bold position on collective countermeasures in cyberspace and clarifies the obligation of due diligence.

Persecution of Human Rights Defenders on Social Media: What to Do About It
A recent report documents how online platforms are used to undermine and increase the vulnerability of activists, justice sector personnel, and journalists. It provides three concrete…

Countering Russia’s Malign Influence Operations
Putin’s successes with covert action show that such operations are not only more effective and cheaper than conventional military operations, but they have also resulted in far…

Remarks by Defense Dept General Counsel Paul C. Ney Jr. on the Law of War
The General Counsel of the U.S. Department of Defense, Hon. Paul C. Ney Jr., delivered the keynote address (full text below) at the Israel Defense Forces 3rd International Conference…

An Emergency or Business as Usual? Huawei and Trump’s Emergency Powers
Should the emergency declaration be used purely as leverage in a trade war, it would clearly be an abuse of the intent of emergency powers.

Why the Christchurch Call to Remove Online Terror Content Triggers Free Speech Concerns
In deciding whether to endorse the Christchurch Call, the question for U.S. policymakers was whether the text essentially called on the U.S. or others to act inconsistently with…