AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles

A U.S. GDPR? Not Even Close  

At the end of June, California enacted a new data privacy regime that some are comparing to the European Union’s recently operative General Data Privacy Regulation (GDPR). The…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.

We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Lawmakers in UK and US Propose Sweeping Changes to Tech Policies to Combat Misinformation

Two years after the twin historic events that rocked the global system--the Brexit referendum and the US Presidential election--lawmakers in Britain and the United States are heading…

Google’s Dragonfly: A Bellwether for Human Rights in the Digital Age

Both of us vividly recall the remarkable events of 2010, when Google took its stand against Chinese government censorship by publicly declaring it would withdraw its search engine…

Locking in Transparency on the Vulnerabilities Equities Process

Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…

Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement

Whether you believe law enforcement is “going dark” or we are in a “golden age of surveillance,” law enforcement faces serious challenges in identifying and accessing digital…
A 3-D illustration of scales lit up against a dark electronic background with computer terms in pale letters.

Launch Event – Low-Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge

Tomorrow morning (Wednesday, July 25), from 8-10 am ET, Senator Sheldon Whitehouse — along with DOJ’s former Assistant Attorney General for National Security, David Kris…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility

The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

Cybersecurity and the 2020 Census: Are We Prepared?

A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

Six Big Takeaways from Mueller’s Indictment of Russian Intel Officers

One of the biggest takeaways from Mueller's indictment? WikiLeaks appears to have been deeply involved in a Russian intelligence operation.
Locks on $100 bill with an internet browser overlaid.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation

A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

Protecting Civilians in Cyberspace: Ideas for the Road Ahead

Distinctions between offline and online conflicts are blurring as tools and tactics deployed in cyberspace trigger real world consequences. In Mexico, for example, commercial spyware…
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: