This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Just Security’s expert authors offer strategic analysis on AI, cyber, quantum and other emerging technologies, including the national security implications of AI, global governance frameworks, the evolving cyber risk landscape, and how technology use cases comport with legal and ethical considerations.

× Clear Filters
1,148 Articles
Just Security

Crowdsourcing Intelligence – Putting Smart Phones to Good Use

It is painfully clear that there are vast reservoirs of useful, untapped information in the hands of individuals across the world who are already tethered to the digital environment. …
Just Security

Do women have anything to say about autonomous weapons? [Updated on October 25, 2016]

Update (October 25, 2016) — Mary Wareham of the Campaign to Stop Killer Robots maintains a regularly updated “Binder of Women,” listing the names and bios of…
Just Security

Start of first inter-governmental expert meeting on autonomous weapons

Today, the 117 states parties to the Convention on Certain Conventional Weapons (CCW) held their first expert meeting on lethal autonomous weapons systems – weapons that can…
Just Security

Magistrate’s Compliance: Searching Electronic Data Overseas

Amidst all the talk about the so-called Magistrates’ Revolt (referring to a group of magistrates pushing back against the government’s broad electronic search requests), it’s…
Just Security

Developments on Autonomous Weapons Systems Governance

For Just Security readers following the emerging debate on the legal governance of autonomous weapons systems (AWS), this month is very eventful with two noteworthy developments…
Just Security

White House Makes Reassuring Noises On 0-Day Policy

Yesterday afternoon, the White House put out a statement describing its view of vulnerability disclosure: the contentious issue of whether and when government agencies should disclose…
Just Security

New Editors’ Picks Reading List: IHRL on Privacy and Surveillance

As regular readers will likely recall, in recent weeks there has been much discussion here on the pages of Just Security (and elsewhere) on important questions regarding the extraterritorial…
Just Security

Huawei Hacking is a Security Scandal

You probably won’t be surprised to learn that people who are neither naïve nor who hate freedom can reasonably disagree with Edward Lucas and his post from this morning…
Just Security

European Parliament Passes Resolution on Drones, Targeted Killings, and Fully Autonomous Weapons

In a landslide vote (534 to 49), the European Parliament has passed a Resolution on drones, targeted killings, and fully autonomous weapons. Stay tuned for a post from one of the…
Just Security

RightsCon, March 3-5, San Francisco

Further to all our coverage of the use and abuse of digital technologies, I commend RightsCon to our readers—a gathering of the Silicon Valley (and beyond) tech community, digital…
Just Security

Changes to Export Control Arrangement Apply to Computer Exploits and More

Last month, changes to the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (“Wassenaar Arrangement”) placed “zero-days,”…
Just Security

Table of Contents: Mini Forum on President’s Review Group on Intelligence and Communications Technologies [Updated]

Just Security has been holding a “mini forum” on the Report of the President’s Review Group on Intelligence and Communications Technologies. The following list contains…
1-12 of 1,148 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: