AI & Emerging Technology
Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.
1,139 Articles
The US Needs a New International Strategy for Cyberspace
Editors’ Note: The following post is the latest installment of our weekly feature, “Monday Reflections,” in which a different Just Security editor will take an in-depth…
Takeaways from the House Intelligence Committee Cybersecurity Hearing
On Thursday morning, the House Permanent Select Committee on Intelligence held a hearing on “Cybersecurity Threats: The Way Forward,” featuring testimony by Adm. Michael Rogers,…
The Private Frontline in Cybersecurity Offense and Defense
Two reports released Tuesday highlight the important role private actors are playing in cybersecurity defense. Cybersecurity company FireEye released a report on espionage activities…
International Agreements—and Disagreements—on Cybersecurity
Russian media report here and here that Russia and China are preparing to sign a cybersecurity treaty when Vladimir Putin visits China on November 10. The reported agreement would…
Security “Front Doors” vs. “Back Doors”: A Distinction Without a Difference
Thursday, FBI Director James Comey delivered a talk at the Brookings Institution, titled “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?” His…
Twitter’s First Amendment Suit & the Warrant-Canary Question
This week, Twitter lobbed the latest volley in what has been both a fascinating and encouraging repositioning of technology companies vis-à-vis the U.S. government—a pivot that…
Bugs, Bounties, and Blowback
Last week news broke of a major software bug—now termed “Shellshock”—in open-source software used in Linux and UNIX operating systems. Security experts have warned that…
Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance
A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people…
Russian Treaty Violations: A Blast from the Past or an Omen for the Future
On July 28, the New York Times ran a story with the headline “U.S. Says Russia Tested Cruise Missile, Violating Treaty.” Surprisingly, this story about an arms control…
New Cybersecurity Primer by the Center for a New American Security
Last week the Center for a New American Security (CNAS) released a new report on cybersecurity authored by Richard Danzig titled “Surviving on a Diet of Poisoned Fruit: Reducing…
Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part II
[Editor’s Note: This is Part II of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…
Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part I
[Editor’s Note: This is Part I of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…