AI & Emerging Technology

Cyber

× Clear Filters
394 Articles
Image of the Capital overlayed with digital color blocks

Beyond Data Rescue: Building Structural Safeguards for Federal Data Preservation

Disappearance of vital resources from government websites exposes a fragile ecosystem in which accountability mechanisms have broken down.
gavel hammer with smartphone on blue background.

Online Safety Regulations Around the World: The State of Play and The Way Forward

A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.
Trump's AI Strategy Takes Shape

The Just Security Podcast: Trump’s AI Strategy Takes Shape

Is a distinct Trump strategy for AI beginning to emerge—and what will that mean for the United States and the rest of the world?  
A navigator, with the call sign Actor, and a drone operator with the callsign Sapsan rest while looking at their phones in a forward bunker position on the Southern frontline near Orikhiv, Ukraine

#War #Sponsored: Using Targeted Ads to Promote Compliance with International Humanitarian Law

As combatants sit in the trenches – scrolling, posting, taking selfies – they can be targeted with online ads that espouse the laws of war.
A phone screen displays a video featuring an AI-generated avatar depicting a TV news anchor on a fictional Venezuelan newscast

When AI Fuels Atrocities — And How It Can Help Prevent Them

Generative AI can fuel new forms of manipulation, but also holds promise for mitigating atrocities and enabling early detection.
Central Intelligence Agency Director John Ratcliffe (R), accompanied by FBI Director Kash Patel (L), and Director of National Intelligence Tulsi Gabbard (C)

Signal Gate: The Criminal Law Precedents That Are Most Relevant

A range of federal laws, including the Espionage Act and laws against the destruction of government records, could apply in this case.
The photo shows three people in the center of the photo walking on barren ground toward the camera, a woman in a red robe and head covering walking toward them at the right of the image, and several people at the back left of the frame. Wooden market stalls on the left edge are closed and covered, and a row of brick and stucco buildings line the right side of the market alley.

From Open-Source to All-Source: Leveraging Local Knowledge for Atrocity Prevention

The focus on open source investigation of serious international crimes often comes at the expense of more effective local expertise.
photograph of Travis LeBlanc speaking into a microphone.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake

"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."
Digital generated image of multi coloured data against black background.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative

Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.
Voter Bots And Human Voters as an AI Bot voting and robots Election votes as Artificial intelligence using autonomous voter technologies disrupting elections as computer democracy as a robot vote casting ballots.

The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord

Ahead of the Munich Security Conference, one crucial issue is at risk of falling by the wayside: protecting democracy from abuses of AI. 
surveillance cameras

What Just Happened: What Trump’s Hobbling of the Privacy Oversight Board Portends for Exercise of Surveillance Powers

A “small” story about the removal of the three Democrats on the Private and Civil Liberties Board (PCLOB) is ominous.
Digital generated image of data forming fingerprint icons on black background.

Biden’s Cybersecurity Executive Order and What Comes Next Under Trump

Regardless of what steps Trump takes next, Biden's cybersecurity EO reflects an important consensus on the evolving cyber threat landscape.
1-12 of 394 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: