AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,137 Articles

Exploring Gray Zones and LikeWar
"This is a book about how a new kind of communications became a new kind of war,” Peter Singer and Emerson Brooking write in their new book: LikeWar: The Weaponization of Social…

The Politics of Trump’s Mismatched Response to Election Interference
With just over a month until the midterm elections, President Donald Trump took to the UN Security Council to call out an adversary in the room for interfering in our elections.…

New U.K. Law Fails European Court Standards on Mass Interception Disclosed by Snowden
The U.K. government trots out its new surveillance legislation as curing the ills identified by the European Court of Human Rights. That's not the case. The Court’s judgment…

So, You Want to Do Something About Russian Election Interference?
If this White House were actually serious about tackling foreign interference in our elections, what would it do?

Putin Had a Win-Win Strategy for Life Post-2016; Trump, Not So Much
Putin didn't just count on Clinton losing. He also counted on her winning. Three former U.S. Intelligence Community officials analyze Putin's likely strategic thinking in 2016…

Shining a Light on Federal Law Enforcement’s Use of Computer Hacking Tools
Ten years ago, an FBI official impersonated an Associated Press reporter to lure and track a teenager suspected of sending in prank bomb threats to his school. To find him, the…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks
Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…

Does Pervasive Secrecy Impede Intelligence Collection?: How Intelligence Agencies Could Use Crowdsourcing to Foil WMD Attacks
For decades, the edifice of the U.S. intelligence community (IC) has been built on a single principle: that intelligence is best when it is secret. Within the IC, this principle…

How Trump’s Pressure on Google Threatens Government Manipulation of Search Results
Tech behemoths just can’t catch a break these days. Just as they are struggling to meet calls to contain the spread of misinformation and hate speech online, they are being bashed…

Exclusive: U.N. Human Rights Experts Meet With Facebook on “Overly Broad” Definitions of Terrorist Content
In a letter to Facebook CEO Mark Zuckerberg, U.N. Special Rapporteur Fionnuala Ní Aoláin says networks guidelines on removing content and users need more precision and rigor…

Understanding Trump vs. Bruce Ohr: Think Russia’s top crime boss, Semion Mogilevich
Amidst President Donald Trump’s ongoing threats to revoke security clearances from various critics, perhaps the most mysterious person on his enemy list is Bruce Ohr, the Justice…

Tech Companies Are Still Slow Walking Disclosures of Election Interference and Controlling Hate Speech
"While Facebook has made strides, the evidence suggests it needs to take bigger ones—and run rather than walk."