AI & Emerging Technology

Cyber

× Clear Filters
454 Articles
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.
In this pool photograph distributed by the Russian state agency Sputnik, Russia's President Vladimir Putin chairs a Security Council meeting via a videoconference at the Kremlin in Moscow on July 25, 2025. (Photo by SERGEI ILYIN/POOL/AFP via Getty Images)

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime

Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
The Just Security Podcast

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity

As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it. 
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
A scale representing digital justice

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?

Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.
A retro computer encircled by CCTV cameras

Legal Frameworks for Addressing Spyware Harms

Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.
n this photo illustration, the logo of Meta Platforms, Inc. is displayed on a smartphone screen, with the company's latest stock market performance and candlestick chart visible in the background.(Photo illustration by Cheng Xin/Getty Images)

Vague by Design? The Oversight Board, Meta’s DOI Policy, and the Kolovrat Symbol Decision

The Oversight Board's Kolovrat decision reveals more than a dispute over a symbol—it lays bare the deep fault lines in Meta’s content moderation architecture.
Visualization of a man in front of data

The Real National Security Betrayal Isn’t Who Leaves—It’s What Gets Dismantled

The real national security threat from the Trump administration's civil service purges isn’t who might go rogue—it’s the dismantling of the systems built to prevent betrayal.
1-12 of 454 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: