AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,135 Articles

Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are
Last weekend, news broke that Facebook had been informally lobbying lawmakers to let them know the company didn’t oppose the Cybersecurity Information Sharing Act (CISA). The…

A Quick Update: Apple, Privacy, and the All Writs Act of 1789
Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal…

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Update on Apple’s Compelled-Decryption Case
Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act,…

Too Much Posturing and Not Enough Substance on Encryption
Obama administration officials revealed late last week that will not force technology firms to weaken digital encryption to give government greater access to user data. This is…

Adding Some Nuance on the European Court’s Safe Harbor Decision
Yesterday, the European Court of Justice (ECJ) issued a decision about European data protection laws as they relate to data transfers to the US. While there have been a number…

The US-China Cyber Agreement: What’s In and What’s Out
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Just Security’s Second Anniversary Event: The Going Dark Debate
Two years ago this month, Steve Vladeck, Ryan Goodman, and our extraordinary Editorial Board, launched Just Security. In celebration of two fascinating years, we are thrilled to…

The Difficulty With Metaphors and the Fourth Amendment
The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…

Does CISA Contain a Surveillance Law XSS Attack?
Skeptical concerns about the proposed Cybersecurity Information Sharing Act have, thus far, tended to fall into two main categories: Doubts about efficacy—most actual practitioners…

Regulating Autonomous Weapons Might be Smarter Than Banning Them
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

The Dream of Internet Freedom Doesn’t Have to Die
This post is a version of the introduction to the author’s keynote speech, “The Lifecycle of a Revolution” at this year’s Black Hat information security conference. Twenty…