AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,136 Articles
Just Security

The Economic Incentives for International Cybersecurity Coordination

On Friday, the President’s Commission on Enhancing National Cybersecurity published its final report, making 16 recommendations and identifying 53 action items to improve cybersecurity…

KT McFarland’s Hardline on Russia with Nuance

On Friday, the President-elect named KT McFarland as Deputy National Security Advisor, a position that does not require Senate confirmation. In contrast with positions articulated…
Protestors at Standing Rock Indian Reservation stand in the water protesting the Dakota Access pipeline. Police stand across from them blocking them from moving.

Investigating Surveillance Around Standing Rock

An anonymous Facebook plea recently went viral, asking people to check in to the Standing Rock Indian Reservation to thwart police surveillance of the Dakota Access pipeline protesters.…
Just Security

US Transparency Regarding International Law in Cyberspace

Last Thursday, State Department Legal Adviser Brian Egan, delivered an important speech at Berkeley Law School on the relationship between international law and cyber activities. …
Just Security

National Security-Related Congressional Hearings, November 14–18

Tuesday, November 15 10:30am – House Committee on Oversight and Government Reform – Oversight of the Secret Service (here) Wednesday, November 16 10:00am – House Committee…

#RemoveBannon

Trump’s win is mobilizing thousands of citizens around the country to take to the streets under an “anti-Trump” banner. At this nascent stage that banner obscures divergent…
Just Security

State Department’s Chief Legal Adviser Rebukes (Trump’s) Proposed Closures of the Internet

The U.S. government should not consider shutting down parts of the Web as it continues to develop ways to prevent the Internet from being used for terrorist purposes, a top State…
Just Security

Technology and Autonomy in Warfare: A Consideration of the Issue by the US Defense Science Review Board

A new report from the Pentagon’s Defense Science Review Board (DSRB) provides a useful examination of the technical issues concerning the fielding of autonomous weapons. Unquestionably,…
Just Security

The Dangerous Implications of the Microsoft Ireland Case

Yesterday evening, the government filed its petition for rehearing or rehearing en banc in the Microsoft Ireland case. Throughout the brief, the government warns of both the…

International Law and Proposed U.S. Responses to the D.N.C. Hack

In a short essay in Foreign Policy, retired Admiral James Stavridis addresses recent election season cyber operations against the Democratic National Party that the U.S. has attributed…
Just Security

A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate

In my recent Just Security piece, I argued that Aitel and Tait’s suggestions in Lawfare to focus the Vulnerability Equities Process (VEP) more narrowly on strategic intelligence…
Just Security

Weapon, Combatant, Child, Animal: They’re All Insufficient Analogies for Autonomous Weapon Systems

Autonomous weapon systems, that is, weapon systems capable of independently selecting and engaging targets, are usually portrayed in one of two ways. Either they are depicted as…
1-12 of 1,136 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: