This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,148 Articles
Just Security

Social Media Companies Should Decline the Government’s Invitation to Join the National Security State

The pressure on social media companies to limit or take down content in the name of national security has never been greater. Resolving any ambiguity about the how much the Obama…
Just Security

A Few Keystrokes Could Solve the Crime. Would You Press Enter?

Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…
Just Security

“Your Account May Have Been Targeted by State-Sponsored Actors”: Attribution and Evidence of State-Sponsored Cyberattacks

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Was the Cyber Attack on a Dam in New York an Armed Attack?

Concerns about the vulnerability of infrastructure to cyber attacks were highlighted in two recent news articles. Last month, the Wall Street Journal reported that in 2013, Iranian…
Just Security

Ten National Security Oversight Issues to Watch in 2016

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

OmniCISA Pits DHS Against the FCC and FTC on User Privacy

On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would…
Just Security

The FBI Should Stop Undermining Norms Before They Take Root

Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
Just Security

Cross-Border Data Requests: A Response to Greg Nojeim

Editor’s note: This post also appears on Lawfare. Last week on Lawfare, Greg Nojeim responded to — and raised a set of questions about — our proposed framework for dealing…
Just Security

International Law and the UN GGE Report on Information Security

The international community recently took an important step toward establishing global norms of behavior in cyberspace with the publication of the UN’s outcome report from its…
Just Security

Cross-Border Data Requests: A Proposed Framework

Editor’s note: This post also appears on Lawfare. We’ve both written and spoken extensively (for example, here, here, here, here, and here) about issues related to cross-border…
Just Security

Challenges New Weapons and Humanitarian Assistance Present for International Law

Editor’s Note: This is the fourth post in a miniseries about the International Committee of the Red Cross’s newly released Report on International Humanitarian Law and the…
Just Security

Is the FBI Using Zero-Days in Criminal Investigations?

We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web.…
1-12 of 1,148 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: