Technology

× Clear Filters
261 Articles
A multi-purpose weapon robot from US Darley Defense makes his way at the Eurosatory international land and airland defence and security trade fair, in Villepinte, a northern suburb of Paris, on June 13, 2022. (Photo by Emmanuel DUNAND / AFP) (Photo by EMMANUEL DUNAND/AFP via Getty Images)

Gendering the Legal Review of New Means and Methods of Warfare

Weapons' use and impact on civilians and combatants varies across genders - meaning States must undertake gender-sensitive reviews of new weapons.
The US Department of Homeland Security building

DHS IG Cuffari’s Actions Exhibit Clear Pattern: Unwillingness or Inability to Meet the Mission

President Biden may be tempted to let the inspector general community police their own, but that might tacitly approve inferior performance.
Ian James Mwai (R), 23, browses social media platforms on his mobile phone with a member of his outfit of social media influencers at an office in Thika town, central Kenya on April 26, 2022. He was in the vanguard of the growing ranks of influencers feverishly punching keyboards and hoping to tilt the outcome of the country's high-stakes elections, being conducted today, Aug. 9. The rising dominance of apps like Twitter and Facebook has opened a new front in Kenyan politics, with candidates desperate to draw the attention of the country's 12 million social media users.

Banning Content Platforms is Not a Solution to Hate Speech on the Internet, Even When the Platform is Meta

Governments should recognize that pulling the plug on the internet – or on an entire social media platform – is not a viable solution to the spread of hate speech or misinformation…

The Biden Administration’s China Policy: An Inventory of Actions to Address the Challenge 

An overview shows a hardline approach partially inherited from Trump merged with an emphasis on working with allies and partners. 
Image: Hands hold a smartphone, the screen of which shows a series of chat messages in Chinese. The background is dark. This picture taken on July 16, 2021 shows user Melissa messaging her virtual boyfriend - a chatbot created by XiaoIce, an artificial intelligence system designed to create emotional bonds with its estimated 660 million users worldwide - on her mobile phone in Beijing. - (Photo by WANG ZHAO/AFP via Getty Images)

The Existential Threat of AI-Enhanced Disinformation Operations

As AI capabilities improve, they will become increasingly effective tools for manipulating and fooling humans - with political, social, and epistemological consequences.
Spain's Prime Minister Pedro Sanchez (R) and US President Joe Biden address a press conference following their meeting ahead of a NATO summit, at La Moncloa Palace in Madrid, on June 28, 2022.

NATO Must Tackle Digital Authoritarianism

NATO must prepare to shape an era of intensifying great power competition and profound technological disruption.
Woman walking in front of red-brown building with words "NSO Group" visible on side.

NSO v. WhatsApp: Should the Solicitor General Recommend Allowing Foreign Corporations to Claim Immunity?

"The best position for the Solicitor General to take on the immunity of corporations is the one the Ninth Circuit adopted: 'If an entity does not fall within the Act’s definition…

Russia’s Nuclear Threat Inflation: Misguided and Dangerous

Putin's cavalier use of nuclear coercive diplomacy poses risks for international relations and Russia’s own national security policy.
A person holds a cell phone as they type on a laptop.

Sobre el nuevo protocolo sobre vigilancia transfronteriza en materia de cibercrimen, un llamado a la cautela

En vez de "un enfoque proporcionado ... da prioridad a la aplicación de la ley en detrimento de la privacidad, la protección de datos y los derechos humanos."
A person holds a cell phone as they type on a laptop.

On New Cross-Border Cybercrime Policing Protocol, a Call for Caution

The treaty creates a range of new policing powers with weak privacy and human rights standards and fails to include sufficient oversight.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks

The first session provided a valuable view into where States stand, what the convention may aim to achieve, and its political viability.
1-12 of 261 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: