AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,135 Articles

Legislative Cyber Threats: CISA’s Not The Only One
If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal…

Cyber Conflict in DOD’s Law of War Manual
Editor’s Note: Just Security is holding a “mini forum” on the new Defense Department Law of War Manual. This series includes posts from Sean Watts, Eric Jensen, Adil Ahmad…

The Government’s Wiretap Orders Still Don’t Add Up
Last week, I pointed out that the Administrative Office (AO) of the US Courts’ 2014 Wiretap Report numbers didn’t add up to the total number of wiretaps that AT&T, Verizon,…

“International Cyber Stability” and the UN Group of Governmental Experts
In recent months, the United States has been pushing a new policy of “international cyber stability.” In a speech in Seoul in May, Secretary of State John Kerry explained that…

It’s Time to End the “Debate” on Encryption Backdoors
Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…

Wiretap Numbers Don’t Add Up
Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications…

OPM, CISA, and the Cybersecurity Oxymoron
In Congress, bad policy ideas are like vampires: They are very hard to kill because they’re always somehow coming back from the dead. Such is the case with this year’s iteration…

A New US-UK Data Sharing Treaty?
In a little-noticed piece of news (at least in the US), the UK has been contemplating a new international treaty to enable British authorities to access user data held by US tech…

ISIL’s Online Offensive: Challenges in Countering ISIL in Cyberspace
The US-led campaign against ISIL is going well in neither the terrestrial nor cyber realms. ISIL’s successful offensives against Ramadi in Iraq and Palmyra in Syria in late May…

The OPM Hack and the New DOD Law of War Manual
Last Friday was a big day in cybersecurity news. OPM announced that, in addition to the compromise of the personnel information of federal employees revealed on June 4, Chinese…

A Veteran’s Perspective on “Killer Robots”
Technological advances in robotics and other fields are already assisting soldiers with dull, dirty, and dangerous jobs on the battlefield. Within the military such advances should…

One More Reason for Companies to Report Data Breaches
Trust. And benefits. Those are two key issues impacting effective cybersecurity collaboration: whether companies and their legal advisors trust the government enough to reach out…