This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,148 Articles
Just Security

International Agreements—and Disagreements—on Cybersecurity

Russian media report here and here that Russia and China are preparing to sign a cybersecurity treaty when Vladimir Putin visits China on November 10. The reported agreement would…
Just Security

Security “Front Doors” vs. “Back Doors”: A Distinction Without a Difference

Thursday, FBI Director James Comey delivered a talk at the Brookings Institution, titled “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?” His…
Just Security

Twitter’s First Amendment Suit & the Warrant-Canary Question

This week, Twitter lobbed the latest volley in what has been both a fascinating and encouraging repositioning of technology companies vis-à-vis the U.S. government—a pivot that…
Just Security

Bugs, Bounties, and Blowback

Last week news broke of a major software bug—now termed “Shellshock”—in open-source software used in Linux and UNIX operating systems. Security experts have warned that…
Just Security

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people…
Just Security

Russian Treaty Violations: A Blast from the Past or an Omen for the Future

On July 28, the New York Times ran a story with the headline “U.S. Says Russia Tested Cruise Missile, Violating Treaty.” Surprisingly, this story about an arms control…
Just Security

New Cybersecurity Primer by the Center for a New American Security

Last week the Center for a New American Security (CNAS) released a new report on cybersecurity authored by Richard Danzig titled “Surviving on a Diet of Poisoned Fruit: Reducing…
Just Security

Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part II

[Editor’s Note: This is Part II of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…
Just Security

Autonomy, “Killer Robots,” and Human Control in the Use of Force – Part I

[Editor’s Note: This is Part I of a two-part guest post from Paul Scharre, a fellow and Project Director for the 20YY Warfare Initiative at the Center for a New American…
Just Security

Autonomous Weapons Debate: Three issues for further consideration

As recently reported by Sarah Knuckey and Bonnie Docherty, the “Certain Conventional Weapons (CCW) Informal Meeting of Experts on Lethal Autonomous Weapons Systems” was held…
Just Security

Taking on “Killer Robots”

New weapons that could revolutionize killing are on the horizon. Lethal autonomous weapons systems, also called fully autonomous weapons or “killer robots,” would go beyond…
Just Security

Governments Conclude First (Ever) Debate on Autonomous Weapons: What Happened and What’s Next

This week at the United Nations in Geneva, the 117 states parties to the Convention on Certain Conventional Weapons (CCW) held the first inter-governmental debate on autonomous…
1-12 of 1,148 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: