AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,137 Articles
Donald Trump Jr. in an elevator at Trump Tower on January 18, 2017 in New York City.

Former Prosecutor Renato Mariotti’s Tweet Threads on National Security (Dec. 1-8)

Here is an exposition and analysis of some of this week’s national security-related threads authored by Just Security Editorial Board member and former federal prosecutor Renato…
Erik Prince, chairman of the Prince Group, LLC and Blackwater USA, holds up a picture showing the damage inflicted by a car bomb while testifying during a House Oversight and Government Reform Committee hearing on Capitol Hill October 2, 2007 in Washington DC.

Thoughts on Erik Prince’s Proposal to Privatize Intelligence Gathering

This week we learned, via the Intercept, of Erik Prince’s proposal to provide the Trump Administration with a private intelligence outfit.  According to the Intercept, “The…
The NSA building and parking lots lit up at night.

Responding to the Myths About Reforming FISA’s Section 702

Image: National Security Agency headquarters, Fort Meade, Md. As the New Year’s deadline for reauthorizing Section 702 of the Foreign Intelligence Surveillance Act (FISA) approaches,…
A FBI Agent and FBI Analyst sit a desk with computers and look at an open case with tools during a basic field training course.

Warrantless Backdoor Searches are Not “Business as Usual”

This week, Just Security ran two posts, one by Matt Olsen and one by Asha Rangappa, defending the government’s warrantless access to Americans’ communications obtained “incidentally”…

The Supreme Court May Be Ready to Further Limit Warrantless Access to Communications

Yesterday, the Supreme Court heard oral argument in Carpenter v. United States, a case involving the privacy of cell phone location information. At issue is whether the government…
Just Security

Episode 47 of the National Security Law Podcast: Donuts and Depth Charges

And…we’re back! Fresh off of Thanksgiving, Professor Chesney and I are (all too) fired up to discuss the latest national security law news (not to mention a bunch of stuff…

Mark Zuckerberg’s Latest Fig Leaf for His Russian Propaganda Problem

Since Facebook disclosed that at least 150 million Americans were exposed to Russian propaganda on its platform in the run up to the 2016 election, pressure has been growing for…
U.S. border official Marshall Walcer inspects the identification of a Mexican citizen at the U.S.-Mexico border crossing on December 10, 2010 in Nogales, Arizona. Others wait on line in the background.

Extreme Vetting by Algorithm

Last week, a group of machine learning and data mining experts wrote to the acting secretary of DHS urging her to reconsider an automated Extreme Vetting Initiative being proposed…

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act

For years now, there has been a discussion surrounding the feasibility of active cyber defense, and allowing private entities or individuals to “hack back” against hostile…

Episode 46 of the National Security Law Podcast: The $15 Million Dollar Man

In this week’s episode, your devoted hosts dig into a bonanza of national security law odds-and-ends. First up is an en banc decision by the Foreign Intelligence Surveillance…

Lethal Autonomous Weapons and Policy-Making Amid Disruptive Technological Change

(In Part I of this post on UN talks on lethal autonomous weapons, I discussed how the underlying artificial intelligence that enables autonomous systems is improving rapidly. In…
Committee Chairman Rep. Bob Goodlatte (R-VA) and ranking member Rep. John Conyers (D-MI) participate in a markup hearing before the House Judiciary Committee March 29, 2017 on Capitol Hill in Washington, DC.

The USA Liberty Act — aka Don’t Let the Constitutional be the Enemy of the Unconstitutional

The House Judiciary Committee has completed its markup of a major surveillance reform bill intended to better protect Americans’ privacy and enhance transparency. Responding…
1-12 of 1,137 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: