AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,139 Articles
Just Security

The US Needs a New International Strategy for Cyberspace

Editors’ Note: The following post is the latest installment of our weekly feature, “Monday Reflections,” in which a different Just Security editor will take an in-depth…
Just Security

Takeaways from the House Intelligence Committee Cybersecurity Hearing

On Thursday morning, the House Permanent Select Committee on Intelligence held a hearing on “Cybersecurity Threats: The Way Forward,” featuring testimony by Adm. Michael Rogers,…
Just Security

The Private Frontline in Cybersecurity Offense and Defense

Two reports released Tuesday highlight the important role private actors are playing in cybersecurity defense. Cybersecurity company FireEye released a report on espionage activities…
Just Security

International Agreements—and Disagreements—on Cybersecurity

Russian media report here and here that Russia and China are preparing to sign a cybersecurity treaty when Vladimir Putin visits China on November 10. The reported agreement would…
Just Security

Security “Front Doors” vs. “Back Doors”: A Distinction Without a Difference

Thursday, FBI Director James Comey delivered a talk at the Brookings Institution, titled “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?” His…
Just Security

Twitter’s First Amendment Suit & the Warrant-Canary Question

This week, Twitter lobbed the latest volley in what has been both a fascinating and encouraging repositioning of technology companies vis-à-vis the U.S. government—a pivot that…
Just Security

Bugs, Bounties, and Blowback

Last week news broke of a major software bug—now termed “Shellshock”—in open-source software used in Linux and UNIX operating systems. Security experts have warned that…
Just Security

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people…
Just Security

Russian Treaty Violations: A Blast from the Past or an Omen for the Future

On July 28, the New York Times ran a story with the headline “U.S. Says Russia Tested Cruise Missile, Violating Treaty.” Surprisingly, this story about an arms control…
Just Security

New Cybersecurity Primer by the Center for a New American Security

Last week the Center for a New American Security (CNAS) released a new report on cybersecurity authored by Richard Danzig titled “Surviving on a Diet of Poisoned Fruit: Reducing…
Just Security

Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part II

[Editor’s Note: This is Part II of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…
Just Security

Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part I

[Editor’s Note: This is Part I of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…
1-12 of 1,139 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: