AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,136 Articles
Just Security

[UPDATED] Magistrate Judge Orenstein’s order in the EDNY, denying DOJ’s All Writs Act request . . .

. . . is here. The order that the government requested the judge to issue would have required Apple to bypass the passcode security on an iPhone 5s (which used Apple’s iOS…
Just Security

Apple’s motion to vacate the All Writs Act assistance order: Has Apple chosen the best “test case”?

Here it is. On first read, I think it has some very strong sections, including, in particular, its description of the efforts Apple would have to undertake to create and secure…
Just Security

House Judiciary Committee Hearing Tomorrow: Law Enforcement Access to Data Across Borders

Tomorrow, the House Judiciary Committee will be holding a “Hearing on International Conflicts of Law Concerning Border Data Flow and Law Enforcement Requests” — an issue…
Just Security

Apple vs. FBI: “Just This Once”?

I wrote about the FBI’s attempt to force Apple to write an iPhone hacking tool for the bureau over at Time last week — and go read that if you’re getting caught up on the…
Just Security

Who Sets the Rules of the Privacy and Security Game?

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Security and the Internet of Things

On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…
Just Security

MLAT Reform and the 80 Percent Solution

Last week, The Washington Post reported that the US and the UK were in negotiations to permit UK law enforcement agencies to request stored communications like email and chats…
Just Security

Surveillance Is Still About Power

Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
Just Security

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Just Security

America’s Muddled Approach to Fighting ISIS

Last month, the Los Angeles Times ran a story that helped highlight one facet of the muddled thinking afflicting the US government’s campaign against ISIS: While the military…
Just Security

“Ideating” on ISIS and Silicon Valley

In a lot of Silicon Valley meetings, participants “iterate,” “ideate,” and “sync,” and do other buzzwordy things. Every once in a while something innovative and impactful…
1-12 of 1,136 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: