AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles
One hundred cardboard cutouts of Facebook founder and CEO Mark Zuckerberg stand outside the US Capitol in Washington, DC, April 10, 2018. The cardboard cutouts wear shirts that read, "fix fakebook."

Can American Political Candidates Help Stop the Flood of Disinformation with a Pledge?

U.S. intelligence officials are already issuing warnings about foreign interference in American democracy ahead of what promises to be a bruising 2020 election cycle. Delivering…
The International Criminal Court on January 18, 2019.

The Hidden Danger of User-Generated Evidence for International Criminal Justice

In the summer of 2017, judges at the International Criminal Court (ICC) took a remarkable step. For the first time, they issued an arrest warrant based primarily on video footage…
A new DJI Mavic Zoom drone flies during a product launch event at the Brooklyn Navy Yard, August 23, 2018 in New York City.

NYPD Spy Drones Fly into Privacy Headwinds

A squad of 14 New York Police Department drones will soon be soaring over the city’s skyline, with the ability to record people’s lives, even if that’s not their stated…
Putin and Trump

Western Covert Action and Russian Active Measures: Hypocrisy or Divergent Values?

Most Americans now realize the Kremlin has attempted to influence, interfere, and subvert our democratic system. Recent reports even suggest the Russian intelligence services may…
A Luas tram heads for Dublin on December 2, 2010 near Cherrywood - south of Dublin, Ireland.

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking

Imagine hackers commandeered a capital city’s transit system, holding it hostage for a cryptocurrency ransom. Consider the implications of this attack: beyond a data breach,…
Shanghai at night with an overlay of binary coding.

Weapons of Mass Consumerism: Why China Wants Your Personal Information

A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…
Aerial photograph of the Government Communications Headquarters, also known as GCHQ, Cheltenham Gloucestershire.

Give Up the Ghost: A Backdoor by Another Name

Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Most Read Just Security Articles of 2018

The 18 most read articles of 2018.

2018 Was A Trying Year For Social Media Platforms–And Their Users: Three Pathways Forward

2018 saw two types of controversies erupt over social media, and 2019 may see one of three pathways forward.

Russia’s Tightening Control of Cyberspace Within its Borders

Russian proposals to ban certain materials online and to block search engines that don’t comply with requests of state authorities highlight the need to beware of domestic policies…

The Most Extraordinary Lesson of Two New Reports on Russian Disinformation: What They Reveal About White House Paralysis

"The very issuance of these reports and the novelty of what they still reveal serve as an indictment of the White House’s persistent inaction."

The Huawei Arrest: How It Likely Happened and What Comes Next

The arrest and possible extradition of an executive of Chinese tech giant Huawei raises important questions about foreign policy cases and Justice Department autonomy.
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: