AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,135 Articles
Just Security

Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are

Last weekend, news broke that Facebook had been informally lobbying lawmakers to let them know the company didn’t oppose the Cybersecurity Information Sharing Act (CISA). The…
Just Security

A Quick Update: Apple, Privacy, and the All Writs Act of 1789

Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal…
Just Security

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Update on Apple’s Compelled-Decryption Case

Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act,…
Just Security

Too Much Posturing and Not Enough Substance on Encryption

Obama administration officials revealed late last week that will not force technology firms to weaken digital encryption to give government greater access to user data. This is…
Just Security

Adding Some Nuance on the European Court’s Safe Harbor Decision

Yesterday, the European Court of Justice (ECJ) issued a decision about European data protection laws as they relate to data transfers to the US. While there have been a number…
Just Security

The US-China Cyber Agreement: What’s In and What’s Out

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Just Security’s Second Anniversary Event: The Going Dark Debate

Two years ago this month, Steve Vladeck, Ryan Goodman, and our extraordinary Editorial Board, launched Just Security. In celebration of two fascinating years, we are thrilled to…
Just Security

The Difficulty With Metaphors and the Fourth Amendment

The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…
Just Security

Does CISA Contain a Surveillance Law XSS Attack?

Skeptical concerns about the proposed Cybersecurity Information Sharing Act have, thus far, tended to fall into two main categories: Doubts about efficacy—most actual practitioners…
Just Security

Regulating Autonomous Weapons Might be Smarter Than Banning Them

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The Dream of Internet Freedom Doesn’t Have to Die

This post is a version of the introduction to the author’s keynote speech, “The Lifecycle of a Revolution” at this year’s Black Hat information security conference. Twenty…
1-12 of 1,135 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: