AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,136 Articles

Your Tweet is My Command

My friend Phil Carter has written an excellent piece for Slate, pointing out the institutional dangers of disregarding President Trump’s recent series of tweets that…

As Hackers Target U.S. Voting Machines, We Need Leaders Who’ll Put Country Over Party

“If there has ever been a clarion call for vigilance and action against a threat to the very foundation of our democratic political system, this episode is it,” former…

When This Part is Over–America Post the Russia Investigation

At some point, Special Counsel Robert Mueller will complete his investigation. He could bring criminal charges, name other co-conspirators, comment on possible grounds for impeachment,…

Voter Access, Not Voter Fraud, Is A Pressing National Security Issue

The Presidential Advisory Commission on Election Integrity — a body set up by President Donald Trump to investigate “the registration and voting processes used in Federal…

International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms

On June 23, after years of slow yet meaningful progress in developing State consensus regarding the application of international law norms to cyberspace, the UN Group of Governmental…

Norms Watch: Democracy, the Trump Administration, and Reactions to It (June 23-June 30)

Editor’s Note: Welcome to the latest installment of Norms Watch, our series tracking both the flouting of democratic norms by the Trump administration and the erosion of…

Political Parties as Critical Infrastructure?

Former Secretary of Homeland Security Jeh Johnson testified Wednesday before the House Intelligence Committee as part of the House investigation into Russian interference in the…

Norms Watch: Democracy, the Trump Administration, and Reactions to It (June 2-June 9)

Editor’s Note: Welcome to the latest installment of Norms Watch, our series tracking both the flouting of democratic norms by the Trump administration and the erosion of…
A map titled, “Tainted Leaks: Targets Linked to 39 Countries” published by Citizen Lab 2017 shows 10 countries highlighted in pink indicating the “top 10 countries of Targeting in the phishing campaign.” 1. Ukraine 22%; 2. Russia 11%; 3. Turkey 7%; 4. Kyrgyzstan 7%; 5. Georgia 6%; 6. USA 5%; 7. Kazakhstan 4%; 8. Mongolia 3%; 9. Armenia 3%; 10. Uzbekistan 3%

Q & A With Citizen Lab on “Tainted Leaks” and Russia’s Disinformation Campaign

On Thursday, the University of Toronto’s Citizen Lab published evidence of a dangerous new twist in the war against truth. Russia-linked hackers, dubbed CyberBerkut, have…
Just Security

National Security-Related Congressional Hearings, May 15-19

Tuesday, May 16 10:00am – Senate Committee on Foreign Relations – Business Meeting (here) 2:30pm – Senate Committee on Intelligence – Intelligence Matters (Closed) (here)…
A website address bar with a secure lock icon.

The Trump Administration’s Early (Appropriate) Focus on Botnets

President Donald Trump’s Executive Order on Cybersecurity, concentrating as it does on things largely within the authority of the executive branch, is a reasonable early approach…
Just Security

National Security-Related Congressional Hearings, May 8-May 12

Monday, May 8 2:30pm – Senate Judiciary Committee – Russian Interference in the 2016 United States Election (here) Tuesday, May 9 9:30am – Senate Committee on Armed Services…
1-12 of 1,136 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: