AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,136 Articles

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs
Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…

To Privacy Rights Advocates: Embrace DOJ’s Cross-Border Data Proposal
In a lengthy post yesterday, Greg Nojeim and Ross Shulman take aim at the newly proposed legislation from DOJ that would permit the cross-border sharing of data for law enforcement…

A 9/11 Commission Approach to the Russian Hack of the DNC
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Judicial Enforcement of a Senate Subpoena of Backpage.com
Last week, the DC Circuit temporarily stayed an order enforcing a US Senate subpoena for records from the classified advertising site, Backpage.com, which has come under scrutiny…

Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad
In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…

Towards a Cyber-Security Treaty
The Democratic National Convention (DNC) leaks revealed last week have presumably reminded many Americans to the severe cyber-threats this country is facing. Particularly alarming…

The DNC Hack and Democracy
Last Tuesday, Jack Goldsmith published a remarkable series of tweets about the apparent Russian hack and publication of confidential DNC emails on the eve of the Democratic…

The Democratic National Committee Hack: Information as Interference
Earlier this month, WikiLeaks released nearly 20,000 e-mails belonging to Democratic National Committee’s top officials, where Senator Bernie Sanders was humiliated and criticized.…

The Microsoft Ireland Case and the Future of Digital Privacy
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Three Key Takeaways: The 2d Circuit Ruling in The Microsoft Warrant Case
As readers no doubt already know, the Second Circuit today issued a surprise ruling in the Microsoft Ireland warrant case — siding with Microsoft. The result: location of data…

Whose World Is This?: US and UK Government Hacking
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules…

The Early Edition: June 21, 2016
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Just what has…