AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,136 Articles

[UPDATED] Magistrate Judge Orenstein’s order in the EDNY, denying DOJ’s All Writs Act request . . .
. . . is here. The order that the government requested the judge to issue would have required Apple to bypass the passcode security on an iPhone 5s (which used Apple’s iOS…

Apple’s motion to vacate the All Writs Act assistance order: Has Apple chosen the best “test case”?
Here it is. On first read, I think it has some very strong sections, including, in particular, its description of the efforts Apple would have to undertake to create and secure…

House Judiciary Committee Hearing Tomorrow: Law Enforcement Access to Data Across Borders
Tomorrow, the House Judiciary Committee will be holding a “Hearing on International Conflicts of Law Concerning Border Data Flow and Law Enforcement Requests” — an issue…

Apple vs. FBI: “Just This Once”?
I wrote about the FBI’s attempt to force Apple to write an iPhone hacking tool for the bureau over at Time last week — and go read that if you’re getting caught up on the…

Who Sets the Rules of the Privacy and Security Game?
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Security and the Internet of Things
On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…

MLAT Reform and the 80 Percent Solution
Last week, The Washington Post reported that the US and the UK were in negotiations to permit UK law enforcement agencies to request stored communications like email and chats…

Surveillance Is Still About Power
Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

IBM’s Terrorist-Hunting Software Raises Troubling Questions
Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…

America’s Muddled Approach to Fighting ISIS
Last month, the Los Angeles Times ran a story that helped highlight one facet of the muddled thinking afflicting the US government’s campaign against ISIS: While the military…

“Ideating” on ISIS and Silicon Valley
In a lot of Silicon Valley meetings, participants “iterate,” “ideate,” and “sync,” and do other buzzwordy things. Every once in a while something innovative and impactful…