AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles

Can “Fake News” be stopped?

The David Hogg conspiracy theory highlights the speed at which false information spreads on social media. And it is currently beyond the capacity of automated systems to determine…

Microsoft, Ireland, and the Rest of the World

United States v. Microsoft will be practically significant for its effect on law enforcement’s ability to access data stored abroad, and it has the potential to be doctrinally…

The Microsoft Design Decisions That Caused this Mess

I need not spend much space on the merits of United States v. Microsoft, the case about the extraterritoriality of email search warrants that the Supreme Court will decide this…

Microsoft (Ireland) and the Federal Rules of Criminal Procedure

Microsoft (Ireland) raises a difficult policy question about when and how U.S. law enforcement may access cross-border data. Unfortunately, the Supreme Court is seemingly set to…

“Extraterritorial” Is Not a Bad Word, Even on the Internet

In the world of Internet policy, it is a slur to call something an assertion of extraterritorial jurisdiction.  Coverage of, for example, Canada’s recent ruling against Google…

A Way Forward on Section 702 Queries

Five suggestions for improving accountability, transparency and understanding.

United States v. Microsoft: Why the Government Should Win the Statutory Interpretation Argument

In United States v. Microsoft, the U.S. Supreme Court will determine the geographic scope of Section 2703 of the Stored Communications Act (SCA), which allows the government to…

Microsoft Ireland: Extraterritoriality Step Zero

United States v. Microsoft is a fascinating case because it appears at the cross-roads of so many different areas of the law—the Fourth Amendment, criminal law, data privacy,…

The Parties in U.S. v. Microsoft Are Misinterpreting the Stored Communications Act’s Warrant Authority

United States v. Microsoft comes to the court in stark terms. The case involves a search warrant demanding that Microsoft turn over stored emails from a server in Ireland. That…

Introducing Just Security’s Symposium on United States v. Microsoft

Just Security is pleased to announce the launch of an online symposium on United States v. Microsoft, which will be argued at the U.S. Supreme Court on February 27. The question…

The Age of Unregulated Social Media Is Over

In the United States, discussion of regulating technology companies such as Google, Facebook and Twitter is still relatively rare, and considered remarkable when it occurs. But…

Left Out of the Party on Cloud Nine: A Response to Jennifer Daskal

A new bill meant to address cross-border access to data is not a cause for celebration. It fails to include fundamental safeguards to protect consumer's rights. The CLOUD Act would…
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: