AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,135 Articles
Just Security

Legislative Cyber Threats: CISA’s Not The Only One

If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal…
Just Security

Cyber Conflict in DOD’s Law of War Manual

Editor’s Note: Just Security is holding a “mini forum” on the new Defense Department Law of War Manual. This series includes posts from Sean Watts, Eric Jensen, Adil Ahmad…
Just Security

The Government’s Wiretap Orders Still Don’t Add Up

Last week, I pointed out that the Administrative Office (AO) of the US Courts’ 2014 Wiretap Report numbers didn’t add up to the total number of wiretaps that AT&T, Verizon,…
Just Security

“International Cyber Stability” and the UN Group of Governmental Experts

In recent months, the United States has been pushing a new policy of “international cyber stability.” In a speech in Seoul in May, Secretary of State John Kerry explained that…
Just Security

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…
Just Security

Wiretap Numbers Don’t Add Up

Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications…
Just Security

OPM, CISA, and the Cybersecurity Oxymoron

In Congress, bad policy ideas are like vampires: They are very hard to kill because they’re always somehow coming back from the dead. Such is the case with this year’s iteration…
Just Security

A New US-UK Data Sharing Treaty?

In a little-noticed piece of news (at least in the US), the UK has been contemplating a new international treaty to enable British authorities to access user data held by US tech…
Just Security

ISIL’s Online Offensive: Challenges in Countering ISIL in Cyberspace

The US-led campaign against ISIL is going well in neither the terrestrial nor cyber realms. ISIL’s successful offensives against Ramadi in Iraq and Palmyra in Syria in late May…
Just Security

The OPM Hack and the New DOD Law of War Manual

Last Friday was a big day in cybersecurity news. OPM announced that, in addition to the compromise of the personnel information of federal employees revealed on June 4, Chinese…
Just Security

A Veteran’s Perspective on “Killer Robots”

Technological advances in robotics and other fields are already assisting soldiers with dull, dirty, and dangerous jobs on the battlefield. Within the military such advances should…
Just Security

One More Reason for Companies to Report Data Breaches

Trust. And benefits. Those are two key issues impacting effective cybersecurity collaboration: whether companies and their legal advisors trust the government enough to reach out…
1-12 of 1,135 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: