{"id":99958,"date":"2025-12-15T07:00:45","date_gmt":"2025-12-15T12:00:45","guid":{"rendered":"https:\/\/www.justsecurity.org\/?p=99958"},"modified":"2025-12-16T14:52:40","modified_gmt":"2025-12-16T19:52:40","slug":"just-securitys-artificial-intelligence-archive","status":"publish","type":"post","link":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/","title":{"rendered":"Just Security&#8217;s Artificial Intelligence Archive"},"content":{"rendered":"<p>Since 2020, <i>Just Security<\/i> has been at the forefront of analysis on rapid shifts in AI-enabled technologies, providing expert commentary on risks, opportunities, and proposed governance mechanisms. The catalog below organizes our collection of articles on artificial intelligence into general categories to facilitate access to relevant topics for policymakers, academic experts, industry leaders, and the general public. The archive will be updated as new articles are published. The archive also is available in reverse chronological order at the <a href=\"https:\/\/www.justsecurity.org\/tag\/artificial-intelligence\/\">artificial intelligence articles page<\/a>.<\/p>\n<div id=\"accordions-100285\" class=\"accordions-100285 accordions\" data-accordions={&quot;lazyLoad&quot;:false,&quot;id&quot;:&quot;100285&quot;,&quot;event&quot;:&quot;click&quot;,&quot;collapsible&quot;:&quot;true&quot;,&quot;heightStyle&quot;:&quot;content&quot;,&quot;animateStyle&quot;:&quot;swing&quot;,&quot;animateDelay&quot;:1000,&quot;navigation&quot;:true,&quot;active&quot;:999,&quot;expandedOther&quot;:&quot;yes&quot;,&quot;URLHash&quot;:&quot;no&quot;,&quot;headerToggle&quot;:&quot;no&quot;,&quot;scrollTop&quot;:&quot;no&quot;,&quot;scrollTopOffset&quot;:100,&quot;stats&quot;:&quot;no&quot;}>\r\n                <div class=\"items\" >\r\n    \r\n            <div post_id=\"100285\" itemcount=\"0\"  header_id=\"header-1726755604372\" id=\"header-1726755604372\" style=\"\" class=\"accordions-head head1726755604372 border-semi-round\" toggle-text=\"\" main-text=\"AI Governance\">\r\n                                    <span id=\"accordion-icons-1726755604372\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755604372\" class=\"accordions-head-title\">AI Governance<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755604372 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/127032\/trump-china-chip-strategy-recalibration\/\">Trump\u2019s Chip Strategy Needs Recalibration<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/schiffermichael\/\">Michael Schiffer<\/a> (December 15, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/126643\/ai-model-outputs-export-control\/\">AI Model Outputs Demand the Attention of Export Control Agencies<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/khawamjoe\/\">Joe Khawam<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/schnabeltim\/\"> Tim Schnabel<\/a> (December 12, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/121990\/governing-ai-agents-globally\/\">Governing AI Agents Globally: The Role of International Law, Norms and Accountability Mechanisms<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/diastalitadesouza\/\">Talita Dias<\/a> (October 17, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/119966\/what-us-china-ai-plans-reveal\/\">Dueling Strategies for Global AI Leadership? What the U.S. and China Action Plans Reveal<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/assaadzena\/\">Zena Assaad<\/a> (September 4, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/119874\/ai-chips-china-us-tech\/\">Selling AI Chips Won\u2019t Keep China Hooked on U.S. Technology<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/eganjanet\/\">Janet Egan<\/a> (September 3, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/119509\/us-chinese-ai-playbooks\/\">The AI Action Plans: How Similar are the U.S. and Chinese Playbooks?<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/singerscott\/\">Scott Singer<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/zvenyhorodskyipavlo\/\"> Pavlo Zvenyhorodskyi<\/a> (August 26, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/117765\/assessing-trump-ai-action-plan\/\">Assessing the Trump Administration\u2019s AI Action Plan<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/winterlevysam\/\">Sam Winter-Levy<\/a> (July 25, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/117752\/just-security-podcast-trump-ai-action-plan\/\">Decoding Trump\u2019s AI Playbook: The AI Action Plan and What Comes Next<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/geltzerjoshua\/\">Joshua Geltzer<\/a>, <a href=\"https:\/\/www.justsecurity.org\/author\/marronjenny\/\">Jenny Marron<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/winterlevysam\/\"> Sam Winter-Levy<\/a> (July 24, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/117137\/rethinking-global-ai-race\/\">Rethinking the Global AI Race<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/shanahanjohnjack\/\">Lt. Gen. (ret.) John (Jack) N.T. Shanahan<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/frazierkevin\/\">Kevin Frazier<\/a> (July 21, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/117234\/trump-ai-action-plan-what-to-look-for\/\">The Trump Administration\u2019s AI Action Plan Is Coming. Here\u2019s What to Look For.<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/geltzerjoshua\/\">Joshua Geltzer<\/a> (July 18, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/116339\/ai-copyright-wars-us-china\/\">AI Copyright Wars Threaten U.S. Technological Primacy in the Face of Rising Chinese Competition<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/drexelbill\/\">Bill Drexel<\/a> (July 8, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/113944\/what-comes-next-after-trumps-ai-deals-in-the-gulf\/\">What Comes Next After Trump\u2019s AI Deals in the Gulf<\/a><br \/>\nBy<a href=\"https:\/\/www.justsecurity.org\/author\/alasdairphillipsrobins\/\"> Alasdair Phillips-Robins<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/winterlevysam\/\"> Sam Winter-Levy<\/a> (June 4, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/113728\/ai-governance-federalism-moratorium\/\">AI Governance Needs Federalism, Not a Federally Imposed Moratorium<\/a><br \/>\nBy<a href=\"https:\/\/www.justsecurity.org\/author\/rubensteindavid\/\"> David S. Rubenstein<\/a> (May 29, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/111053\/chinas-open-source-ai-regulation\/\">Open Questions for China\u2019s Open-Source AI Regulation<\/a><br \/>\nBy<a href=\"https:\/\/www.justsecurity.org\/author\/htinnandamin\/\"> Nanda Min Htin<\/a> (May 5, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/110517\/the-just-security-podcast-trumps-ai-strategy-takes-shape\/\">The Just Security Podcast: Trump\u2019s AI Strategy Takes Shape<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/geltzerjoshua\/\">Joshua Geltzer<\/a> (April 17, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/109203\/us-ai-action-plan\/\">Shaping the AI Action Plan: Responses to the White House\u2019s Request for Information<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/aptclara\/\">Clara Apt<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (March 18, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/108144\/blanket-bans-software-exports-not-solution-ai-arms-race\/\">Export Controls on Open-Source Models Will Not Win the AI Race<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/wilsonclaudia\/\">Claudia Wilson<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/hineemmie\/\">Emmie Hine<\/a> (February 25, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/107813\/podcast-artificial-intelligence-action-summit\/\">The Just Security Podcast: Key Takeaways from the Paris AI Action Summit<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (February 12, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/107337\/just-security-podcast-diving-deeper-into-deepseek\/\">The Just Security Podcast: Diving Deeper into DeepSeek<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/heimlennart\/\">Lennart Heim<\/a>, <a href=\"https:\/\/www.justsecurity.org\/author\/mcbridekeegan\/\">Keegan McBride<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/wagnerlauren\/\">Lauren Wagner<\/a> (February 4, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/107245\/deepseek-ai-competition\/\">What DeepSeek Really Changes About AI Competition<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/pilzkonstantinf\/\">Konstantin F. Pilz<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/heimlennart\/\">Lennart Heim<\/a> (February 3, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/106837\/uk-ai-opportunities-action-plan-little-room-responsible-governance\/\">Throwing Caution to the Wind: Unpacking the U.K. AI Opportunities Action Plan<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/schwarzelke\/\">Elke Schwarz<\/a> (January 30, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/106688\/what-happened-trumps-announcement-stargate-ai-project\/\">What Just Happened: Trump\u2019s Announcement of the Stargate AI Infrastructure Project<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/hendrixjustin\/\">Justin Hendrix<\/a> (January 22, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/106545\/the-future-of-the-ai-diffusion-framework\/\">The Future of the AI Diffusion Framework<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/winterlevysam\/\">Sam Winter-Levy<\/a> (January 21, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/106427\/unpacking-the-biden-administrations-executive-order-on-ai-infrastructure\/\">Unpacking the Biden Administration\u2019s Executive Order on AI Infrastructure<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/aptclara\/\">Clara Apt<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\"> Brianna Rosen<\/a> (January 16, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/105900\/us-trump-china-ai\/\">Trump\u2019s Balancing Act with China on Frontier AI Policy<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/singerscott\/\">Scott Singer<\/a> (December 23, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/105752\/ai-presidency\/\">The AI Presidency: What \u201cAmerica First\u201d Means for Global AI Governance<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (December 16, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/104676\/american-ai-leadership-requires-support-open-source\/\">The United States Must Win The Global Open Source AI Race<\/a><br \/>\nBy<a href=\"https:\/\/www.justsecurity.org\/author\/mcbridekeegan\/\"> Keegan McBride<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/woodleyballdean\/\"> Dean W. Ball<\/a> (November 7, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/103339\/artificial-intelligence-at-2024-united-nations\/\">AI at UNGA79: Recapping Key Themes<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/aptclara\/\">Clara Apt<\/a> (October 1, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/100378\/military-ai\/\">Rethinking Responsible Use of Military AI: From Principles to Practice<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/bridgemantess\/\"> Tess Bridgeman<\/a> (September 26, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/100130\/competition-not-control-is-key-to-winning-the-global-ai-race\/\">Competition, Not Control, is Key to Winning the Global AI Race<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/mittelsteadtmatthew\/\">Matthew Mittelsteadt<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/mcbridekeegan\/\">Keegan McBride<\/a> (September 17, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/100060\/podcast-ai-stragetic-risks\/\">The Just Security Podcast: Strategic Risks of AI and Recapping the 2024 REAIM Summit<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (September 12, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/99831\/reaim-second-summit-context\/\">Putting the Second REAIM Summit into Context<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/vestnertobias\/\">Tobias Vestner<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/cleoburysimon\/\">Simon Cleobury<\/a> (September 5, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/96201\/enforcing-ai-guardrails\/\">The Nuts and Bolts of Enforcing AI Guardrails<br \/>\n<\/a>By Amos Toh and Ivey Dyson (May 30, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/94508\/house-hearing-ai-regulation\/\">House Meeting on White House AI Overreach Highlights Congressional Inaction<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/gellermelanie\/\">Melanie Geller<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/melendijulian\/\">Julian Melendi<\/a> (April 12, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/94249\/why-we-need-national-data-protection-strategy\/\">Why We Need a National Data Protection Strategy<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/joelalex\/\">Alex Joel<\/a> (April 4, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/93572\/is-the-biden-administration-reaching-a-new-consensus\/\">Is the Biden Administration Reaching a New Consensus on What Constitutes Private Information<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/hendrixjustin\/\">Justin Hendrix<\/a> (March 19, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/91751\/the-just-security-podcast-how-should-the-world-regulate-artificial-intelligence\/\">The Just Security Podcast: How Should the World Regulate Artificial Intelligence?<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/tragerrobert\/\">Robert Trager<\/a> (February 2, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90757\/its-not-just-technology-what-it-means-to-be-a-global-leader-in-ai\/\">It\u2019s Not Just Technology: What it Means to be a Global Leader in AI<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/blomquistkayla\/\">Kayla Blomquist<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/mcbridekeegan\/\">Keegan McBride<\/a> (January 4, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90903\/ai-governance-in-the-age-of-uncertainty-international-law-as-a-starting-point\/\">AI Governance in the Age of Uncertainty: International Law as a Starting Point<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/90903\/ai-governance-in-the-age-of-uncertainty-international-law-as-a-starting-point\/\">Talita de Souza Dias<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/sagoorashmin\/\">Rashmin Sagoo<\/a> (January 2, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89889\/experts-react-unpacking-the-biden-administrations-new-efforts-on-ai\/\">Experts React: Unpacking the Biden Administration\u2019s New Efforts on AI<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/millerian\/\">Ian Miller<\/a> (November 14, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89870\/bidens-executive-order-on-ai-gives-sweeping-mandate-to-dhs\/\">Biden\u2019s Executive Order on AI Gives Sweeping Mandate to DHS<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/hendrixjustin\/\">Justin Hendrix<\/a> (November 1, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89432\/the-tragedy-of-ai-governance\/\">The Tragedy of AI Governance<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/chestermansimon\/\">Simon Chesterman<\/a> (October 18, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89583\/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law\/\">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (October 18, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/88403\/u-s-senate-ai-hearings-highlight-increased-need-for-regulation\/\">U.S. Senate AI Hearings Highlight Increased Need for Regulation<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/gellermelanie\/\"> Melanie Geller<\/a> (September 25, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/87344\/the-perils-and-promise-of-ai-regulation\/\">The Perils and Promise of AI Regulation<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/dysonivey\/\"> Ivey Dyson<\/a> (July 26, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/87001\/weighing-the-risks-why-a-new-conversation-is-needed-on-ai-safety\/\">Weighing the Risks: Why a New Conversation is Needed on AI Safety<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/deppmichael\/\">Michael Depp<\/a> (June 30, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/87076\/to-legislate-on-ai-schumer-should-start-with-the-basics\/\">To Legislate on AI, Schumer Should Start with the Basics<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/hendrixjustin\/\">Justin Hendrix<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/barrettpaulm\/\"> Paul M. Barrett<\/a> (June 28, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/84724\/regulating-artificial-intelligence-requires-balancing-rights-innovation\/\">Regulating Artificial Intelligence Requires Balancing Rights, Innovation<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/garrisonbishop\/\">Bishop Garrison<\/a> (January 11, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/83837\/emerging-tech-has-a-front-row-seat-at-india-hosted-un-counterterrorism-meeting-what-about-human-rights\/\">Emerging Tech Has a Front-Row Seat at India-Hosted UN Counterterrorism Meeting. What About Human Rights?<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/wisniakmarlena\/\">Marlena Wisniak<\/a> (October 28, 2022)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/82139\/nato-must-tackle-digital-authoritarianism\/\">NATO Must Tackle Digital Authoritarianism<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/flournoymichele\/\">Mich\u00e8le Flournoy<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/royanshu\/\"> Anshu Roy<\/a> (June 29, 2022)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/81839\/natos-2022-strategic-concept-must-enhance-digital-access-and-capacities\/\">NATO\u2019s 2022 Strategic Concept Must Enhance Digital Access and Capacities<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/chrisdolan\/\">Chris Dolan<\/a> (June 8, 2022)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78779\/watchlisting-the-world-digital-security-infrastructures-informal-law-and-the-global-war-on-terror\/\">Watchlisting the World: Digital Security Infrastructures, Informal Law, and the \u201cGlobal War on Terror\u201d<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/kassemramzi\/\">Ramzi Kassem<\/a>,<a href=\"https:\/\/www.justsecurity.org\/author\/mignotmahdavirebecca\/\"> Rebecca Mignot-Mahdavi<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/sullivangavin\/\"> Gavin Sullivan<\/a> (October 28, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/75474\/one-thousand-and-one-talents-the-race-for-a-i-dominance\/\">One Thousand and One Talents: The Race for A.I. Dominance<br \/>\n<\/a>by<a href=\"https:\/\/www.justsecurity.org\/author\/lucasirwin\/\"> Lucas Irwin<\/a> (April 7, 2021)<\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"100285\" itemcount=\"1\"  header_id=\"header-1726755617919\" id=\"header-1726755617919\" style=\"\" class=\"accordions-head head1726755617919 border-semi-round\" toggle-text=\"\" main-text=\"National Security &amp; War\">\r\n                                    <span id=\"accordion-icons-1726755617919\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755617919\" class=\"accordions-head-title\">National Security &amp; War<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755617919 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/121345\/embedded-human-judgment-autonomous-weapons\/\">Embedded Human Judgment in the Age of Autonomous Weapons<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/trabuccolena\/\">Lena Trabucco<\/a> (October 16, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/121289\/ai-hidden-national-security-cost\/\">AI\u2019s Hidden National Security Cost<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/baxtercaroline\/\">Caroline Baxter<\/a> (October 1, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/118879\/transformative-potential-ai-intelligence-analysis\/\">Harnessing the Transformative Potential of AI in Intelligence Analysis<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/bombachrachel\/\">Rachel Bombach<\/a> (August 12, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/112926\/law-supports-ai-government-rag-shows-way\/\">The Law Already Supports AI in Government \u2014 RAG Shows the Way<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/feldmantal\/\">Tal Feldman<\/a> (May 16, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/108644\/united-states-must-avoid-ais-chernobyl-moment\/\">The United States Must Avoid AI\u2019s Chernobyl Moment<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/eganjanet\/\">Janet Egan<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/salvadorcole\/\">Cole Salvador<\/a> (March 10, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/106502\/start-for-ai-transparency-dhs-room-to-grow\/\">A Start for AI Transparency at DHS with Room to Grow<\/a><br \/>\nby <a href=\"https:\/\/www.justsecurity.org\/author\/levinsonwaldmanrachel\/\">Rachel Levinson-Waldman<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/reynoldsspencer\/\">Spencer Reynolds<\/a> (January 22, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/104242\/memorandum-ai-national-security\/\">The U.S. National Security Memorandum on AI: Leading Experts Weigh In\u00a0<\/a><br \/>\nby<a href=\"https:\/\/www.justsecurity.org\/author\/just-security-admin\/\"> Just Security<\/a> (October 25, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/98555\/the-double-black-box-ai-inside-the-national-security-ecosystem\/\">The Double Black Box: AI Inside the National Security Ecosystem<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/98555\/the-double-black-box-ai-inside-the-national-security-ecosystem\/\">Ashley Deeks<\/a> (August 14, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/95939\/as-dhs-implements-new-ai-technologies-it-must-overcome-old-shortcomings\/\">As DHS Implements New AI Technologies, It Must Overcome Old Shortcomings<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/reynoldsspencer\/\">Spencer Reynolds<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> (May 21, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/95630\/biases-in-military-ai\/\">The Machine Got it Wrong? Uncertainties, Assumptions, and Biases in Military AI<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/michelarthurholland\/\">Arthur Holland Michel<\/a> (May 13, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/94113\/bringing-transparency-to-national-security-uses-of-artificial-intelligence\/\">Bringing Transparency to National Security Uses of Artificial Intelligence<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/toomeypatrick\/\">Patrick C. Toomey<\/a> (April 4, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/94999\/an-oversight-model-for-ai-in-national-security-the-privacy-and-civil-liberties-oversight-board\/\">An Oversight Model for AI in National Security: The Privacy and Civil Liberties Oversight Board<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/toomeypatrick\/\">Patrick C. Toomey<\/a> (April 26, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90771\/national-security-carve-outs-undermine-ai-regulations\/\">National Security Carve-Outs Undermine AI Regulations<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/toomeypatrick\/\">Patrick C. Toomey<\/a> (December 21, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90676\/unhuman-killings-ai-and-civilian-harm-in-gaza\/\">Unhuman Killings: AI and Civilian Harm in Gaza<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (December 15, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89567\/dhs-must-evaluate-and-overhaul-its-flawed-automated-systems\/\">DHS Must Evaluate and Overhaul its Flawed Automated Systems<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/levinsonwaldmanrachel\/\">Rachel Levinson-Waldman<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/gutierrezjoseguillermo\/\">Jos\u00e9 Guillermo Guti\u00e9rrez<\/a> (October 19, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89641\/the-path-to-war-is-paved-with-obscure-intentions-signaling-and-perception-in-the-era-of-ai\/\">The Path to War is Paved with Obscure Intentions: Signaling and Perception in the Era of AI<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/wildeg\/\">Gavin Wilde<\/a> (October 20, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89033\/ai-and-the-future-of-drone-warfare-risks-and-recommendations\/\">AI and the Future of Drone Warfare: Risks and Recommendations<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> (October 3, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/85369\/latin-america-and-caribbean-nations-rally-against-autonomous-weapons-systems\/\">Latin America and Caribbean Nations Rally Against Autonomous Weapons Systems<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/dochertybonnie\/\">Bonnie Docherty<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/warehammary\/\"> Mary Wareham<\/a> (March 6, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/84655\/investigating-misconduct-in-war-is-already-difficult-will-the-use-of-military-ai-make-it-harder\/\">Investigating (Mis)conduct in War is Already Difficult<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/bruunlaura\/\">Laura Brunn<\/a> (January 5, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/82745\/gendering-the-legal-review-of-new-means-and-methods-of-warfare\/\">Gendering the Legal Review of New Means and Methods of Warfare<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/farresjimenezandrea\/\">Andrea Farr\u00e9s Jim\u00e9nez<\/a> (August 23, 2022)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/79254\/artificial-intelligence-in-the-intelligence-community-oversight-must-not-be-an-oversight\/\">Artificial Intelligence in the Intelligence Community: Oversight Must Not Be an Oversight<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/stonecorin\/\">Corin R. Stone<\/a> (November 30, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78641\/artificial-intelligence-in-the-intelligence-community-know-risk-know-reward\/\">Artificial Intelligence in the Intelligence Community: Know Risk, Know Reward<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/stonecorin\/\">Corin R. Stone<\/a> (October 19, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78362\/artificial-intelligence-in-the-intelligence-community-the-tangled-web-of-budget-acquisition\/\">Artificial Intelligence in the Intelligence Community: The Tangled Web of Budget & Acquisition<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/stonecorin\/\">Corin R. Stone<\/a> (September 28, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/77970\/embedding-gender-in-international-humanitarian-law-is-artificial-intelligence-up-to-the-task\/\">Embedding Gender in International Humanitarian Law: Is Artificial Intelligence Up to the Task?<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/farresjimenezandrea\/\">Andrea Farr\u00e9s Jim\u00e9nez<\/a> (August 27, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/77783\/artificial-intelligence-in-the-intelligence-community-culture-is-critical\/\">Artificial Intelligence in the Intelligence Community: Culture is Critical<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/stonecorin\/\">Corin R. Stone<\/a> (August 17, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/77354\/artificial-intelligence-in-the-intelligence-community-money-is-not-enough\/\">Artificial Intelligence in the Intelligence Community: Money is Not Enough<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/stonecorin\/\">Corin R. Stone<\/a> (July 12, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/75502\/adding-ai-to-autonomous-weapons-increases-risks-to-civilians-in-armed-conflict\/\">Adding AI to Autonomous Weapons Increases Risks to Civilians in Armed Conflict<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/davisonneil\/\">Neil Davison<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/horowitzjonathan\/\"> Jonathan Horowitz<\/a> (March 26, 2021)<\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"100285\" itemcount=\"2\"  header_id=\"header-1726755618285\" id=\"header-1726755618285\" style=\"\" class=\"accordions-head head1726755618285 border-semi-round\" toggle-text=\"\" main-text=\"Democracy\">\r\n                                    <span id=\"accordion-icons-1726755618285\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755618285\" class=\"accordions-head-title\">Democracy<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755618285 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/118026\/ai-action-plan-federalism-analysis\/\">The AI Action Plan and Federalism: A Constitutional Analysis<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/rubensteindavid\/\">David S. Rubenstein<\/a> (July 30, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/109069\/u-s-ai-driven-catch-and-revoke-initiative-threatens-first-amendment-rights\/\">U.S. AI-Driven \u201cCatch and Revoke\u201d Initiative Threatens First Amendment Rights<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> (March 18, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/107809\/tech-companies-election-threats-regulation\/\">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/givensalexandrareeve\/\">Alexandra Reeve Givens<\/a> (February 13, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/105395\/qa-mariejte-schaake-on-tech-coup-trump\/\">Q&A with Marietje Schaake on the Tech Coup and Trump<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/schaakemarietje\/\">Marietje Schaake<\/a> (February 6, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/103777\/maintaining-the-rule-of-law-in-the-age-of-ai\/\">Maintaining the Rule of Law in the Age of AI<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/szilagyikatie\/\">Katie Szilagyi<\/a> (October 9, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/103317\/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations\/\">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia\u2019s Influence Operations<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/kruschmasonw\/\">Mason W. Krusch<\/a> (October 8, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/99069\/artificial-intelligence-democracy-effects\/\">Don\u2019t Downplay Risks of AI for Democracy<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/nosselsuzanne\/\">Suzanne Nossel<\/a> (August 28, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/93823\/tracking-tech-company-commitments-to-combat-the-misuse-of-ai-in-elections\/\">Tracking Tech Company Commitments to Combat the Misuse of AI in Elections<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/mollenkampallison2\/\">Allison Mollenkamp<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/aptclara\/\">Clara Apt<\/a> (March 28, 224)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/92348\/multiple-threats-converge-to-heighten-disinformation-risks-to-this-years-us-elections\/\">Multiple Threats Converge to Heighten Disinformation Risks to This Year\u2019s US Elections<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/nordenlawrence\/\">Lawrence Norden<\/a>, <a href=\"https:\/\/www.justsecurity.org\/author\/panditharatnemekela\/\">Mekela Panditharatne<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/david-harris\/\">David Harris<\/a> (February 16, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90067\/is-ai-the-right-sword-for-democracy\/\">Is AI the Right Sword for Democray?<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/michelarthurholland\/\">Arthur Holland Michel<\/a> (November 13, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89807\/the-just-security-podcast-the-dangers-of-using-ai-to-ban-books\/\">The Just Security Podcast: The Dangers of Using AI to Ban Books<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/ayoubemile\/\">Emile Ayoub<\/a> (October 27, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/89758\/process-rights-and-the-automation-of-public-services-through-ai-the-case-of-the-liberal-state\/\">Process Rights and the Automation of Public Services through AI: The Case of the Liberal State<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/zerillijohn\/\">John Zerilli<\/a> (October 26, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/88945\/using-ai-to-comply-with-book-bans-makes-those-laws-more-dangerous\/\">Using AI to Comply With Book Bans Makes Those Laws More Dangerous<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/ayoubemile\/\">Emile Ayoub<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> (October 3, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/87005\/regulation-is-not-enough-a-blueprint-for-winning-the-ai-race\/\">Regulation is Not Enough: A Blueprint for Winning the AI Race<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/mcbridekeegan\/\">Keegan McBride<\/a> (June 29, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/82246\/the-existential-threat-of-ai-enhanced-disinformation-operations\/\">The Existential Threat of AI-Enhanced Disinformation Operations<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/honigbergbradley\/\">Bradley Honigberg<\/a> (July 8, 2022)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78381\/system-rivalry-how-democracies-must-compete-with-digital-authoritarians\/\">System Rivalry: How Democracies Must Compete with Digital Authoritarians<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/donahoeeileen\/\">Ambassador (ret.) Eileen Donahoe<\/a> (September 27, 2021)<\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"100285\" itemcount=\"3\"  header_id=\"header-1726755618585\" id=\"header-1726755618585\" style=\"\" class=\"accordions-head head1726755618585 border-semi-round\" toggle-text=\"\" main-text=\"Surveillance\">\r\n                                    <span id=\"accordion-icons-1726755618585\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755618585\" class=\"accordions-head-title\">Surveillance<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755618585 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/106020\/podcast-border-tech-migration\/\">The Just Security Podcast: How Border Technologies Impact Migration<br \/>\n<\/a><a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/cabrerajudith\/\">Judith Cabrera<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/molnarpetra\/\"> Petra Molnar<\/a> (January 2, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/105662\/border-technologies-under-second-trump-administration\/\">Border Technologies Under Trump 2.0<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/molnarpetra\/\">Petra Molnar<\/a> (January 2, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/97172\/ai-at-the-border\/\">AI at the Border: Racialized Impacts and Implications<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/97172\/ai-at-the-border\/\">Priya Morley<\/a> (June 28, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/96517\/podcast-the-walls-have-eyes\/\">The Just Security Podcast: \u2018The Walls Have Eyes\u2019 Book Talk \u2014 Surviving Migration in The Age of Artificial Intelligence<br \/>\n<\/a><a href=\"https:\/\/www.justsecurity.org\/author\/shahparas\/\">Paras Shah<\/a> interview with <a href=\"https:\/\/www.justsecurity.org\/author\/molnarpetra\/\">Petra Molnar<\/a> (June 7, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90879\/advances-in-ai-increase-risks-of-government-social-media-monitoring\/\">Advances in AI Increase Risks of Government Social Media Monitoring<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/patelfaiza\/\">Faiza Patel<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/melendijulian\/\">Julian Melendi<\/a> (January 3, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90763\/eus-ai-act-falls-short-on-protecting-rights-at-borders\/\">EU\u2019s AI Act Falls Short on Protecting Rights at Borders<br \/>\n<\/a>By Petra Molnar (December 20, 2023)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/71837\/new-technologies-new-problems-troubling-surveillance-trends-in-america\/\">New Technologies, New Problems \u2013 Troubling Surveillance Trends in America<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/feldsteinsteven\/\">Steven Feldstein<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/davidwong\/\"> David Wong<\/a> (August 6, 2020)<\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"100285\" itemcount=\"4\"  header_id=\"header-1726755618877\" id=\"header-1726755618877\" style=\"\" class=\"accordions-head head1726755618877 border-semi-round\" toggle-text=\"\" main-text=\"Social Media &amp; Content Moderation\">\r\n                                    <span id=\"accordion-icons-1726755618877\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755618877\" class=\"accordions-head-title\">Social Media &amp; Content Moderation<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755618877 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/94118\/is-generative-ai-the-answer-for-the-failures-of-content-moderation\/\">Is Generative AI the Answer for the Failures of Content Moderation?<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/barrettpaulm\/\">Paul M. Barrett<\/a> and <a href=\"https:\/\/www.justsecurity.org\/author\/hendrixjustin\/\">Justin Hendrix<\/a> (April 3, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/90683\/two-supreme-court-cases-could-shape-the-future-of-ai-and-content-moderation\/\">Two Supreme Court Cases Could Shape the Future of AI and Content Moderation<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/caputonicholas\/\">Nicholas Caputo<\/a> (December 14, 2023)<\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"100285\" itemcount=\"5\"  header_id=\"header-1726755619236\" id=\"header-1726755619236\" style=\"\" class=\"accordions-head head1726755619236 border-semi-round\" toggle-text=\"\" main-text=\"Further Reading\">\r\n                                    <span id=\"accordion-icons-1726755619236\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1726755619236\" class=\"accordions-head-title\">Further Reading<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1726755619236 \">\r\n                <p><a href=\"https:\/\/www.justsecurity.org\/114354\/podcast-cybersecurity-crossroads-jen-easterly\/\">The Just Security Podcast: A Conversation with Jen Easterly \u2014 Cybersecurity at a Crossroads<\/a><br \/>\n<a href=\"https:\/\/www.justsecurity.org\/author\/rosenbrianna\/\">Brianna Rosen<\/a> podcast with <a href=\"https:\/\/www.justsecurity.org\/author\/easterlyjen\/\">Jen Easterly<\/a> (June 10, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/109612\/ai-can-fuel-or-prevent-atrocities\/\">When AI Fuels Atrocities \u2014 And How It Can Help Prevent Them<\/a><br \/>\nBy <a href=\"https:\/\/www.justsecurity.org\/author\/hellerbrittan\/\">Brittan Heller<\/a> (March 31, 2025)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/104604\/algorithm-driven-recruiter-federal-workers\/\">What\u2019s to Stop Algorithm-Driven Recruiters from Rejecting Able Federal Workers With Neuro-Divergent Disabilities?<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/sternsteinaliya\/\">Aliya Sternstein<\/a> (November 8, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/103164\/usaid-digital-policy-conflict-peacebuilding\/\">The Next Step for USAID\u2019s New Digital Policy: Account for Conflict Risks and Include Peacebuilding<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/guintaclaire\/\">Claire Guinta<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/zuroskinick\/\"> Nick Zuroski<\/a> (September 27, 2024)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78797\/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era\/\">Symposium Recap: Security, Privacy, and Innovation \u2013 Reshaping Law for the AI Era<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/brawleylaura\/\">Laura Brawley<\/a>,<a href=\"https:\/\/www.justsecurity.org\/author\/joardarantara\/\"> Antara Joardar<\/a> and<a href=\"https:\/\/www.justsecurity.org\/author\/narasimhanmadhu\/\"> Madhu Narasimhan<\/a> (October 29, 2021)<\/p>\n<p><a href=\"https:\/\/www.justsecurity.org\/78727\/changing-the-story-artificial-intelligence-and-patent-eligibility\/\">Changing the Story: Artificial Intelligence and Patent Eligibility<br \/>\n<\/a>By <a href=\"https:\/\/www.justsecurity.org\/author\/osengakristen\/\">Kristen Osenga<\/a> (October 25, 2021)<\/p>\n            <\/div>\r\n    <\/div>\r\n\r\n\r\n\r\n\r\n            <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Just Security&#8217;s collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.<\/p>\n","protected":false},"author":2274,"featured_media":100288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43209,42696,43211,43212,2763,29851,43217,43214,43208,43210],"tags":[2658,389,1355,22092,2254,42359,1517,2832,2392,42668,1481,131,27686,42043,1331,166,42697,1295,43065,1673,2729],"coauthors":[41927,37431],"class_list":["post-99958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-emerging-technology","category-artificial-intelligence","category-courts-litigation","category-democracy-rule-of-law","category-diplomacy","category-human-rights","category-intelligence-surveillance","category-international-law","category-law-of-armed-conflict-ihl","category-social-media-platforms","tag-artificial-intelligence","tag-china","tag-constitution","tag-content-moderation","tag-data","tag-data-privacy","tag-democracy","tag-digital-surveillance","tag-disinformation","tag-emerging-technology","tag-europe","tag-european-union","tag-freedom-of-speech","tag-great-power-competition","tag-intelligence-community","tag-law-of-armed-conflict-loac","tag-lethal-autonomous-weapons-systems","tag-national-security","tag-regulation","tag-social-media-platforms","tag-united-states"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Just Security&#039;s Artificial Intelligence Archive<\/title>\n<meta name=\"description\" content=\"Just Security&#039;s collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Just Security&#039;s Artificial Intelligence Archive\" \/>\n<meta property=\"og:description\" content=\"Just Security&#039;s collection of articles analyzing the implications of AI for governance, democracy, human rights and warfare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\" \/>\n<meta property=\"og:site_name\" content=\"Just Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/JSBlog\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T12:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T19:52:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage1-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"391\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Clara Apt, Brianna Rosen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Just Security&#039;s collection of articles analyzing the implications of AI for governance, democracy, human rights and warfare.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage1-5.jpg?fit=1024%2C391&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@just_security\" \/>\n<meta name=\"twitter:site\" content=\"@just_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Clara Apt, Brianna Rosen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\"},\"author\":{\"name\":\"Clara Apt\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/0cc3be094e36c6a47de22010ac814da1\"},\"headline\":\"Just Security&#8217;s Artificial Intelligence Archive\",\"datePublished\":\"2025-12-15T12:00:45+00:00\",\"dateModified\":\"2025-12-16T19:52:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\"},\"wordCount\":89,\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1\",\"keywords\":[\"Artificial Intelligence (AI)\",\"China\",\"Constitution\",\"content moderation\",\"Data\",\"Data privacy\",\"Democracy\",\"Digital Surveillance\",\"Disinformation\",\"Emerging technology\",\"Europe\",\"European Union\",\"freedom of speech\",\"Great Power Competition\",\"intelligence community\",\"Law of Armed Conflict (LOAC)\",\"Lethal Autonomous Weapons Systems (LAWS)\",\"national security\",\"Regulation\",\"Social Media Platforms\",\"United States (US)\"],\"articleSection\":[\"AI &amp; Emerging Technology\",\"Artificial Intelligence (AI)\",\"Courts &amp; Litigation\",\"Democracy &amp; Rule of Law\",\"Diplomacy\",\"Human Rights\",\"Intelligence &amp; Surveillance\",\"International Law\",\"Law of Armed Conflict\/IHL\",\"Social Media Platforms\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\",\"url\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\",\"name\":\"Just Security's Artificial Intelligence Archive\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1\",\"datePublished\":\"2025-12-15T12:00:45+00:00\",\"dateModified\":\"2025-12-16T19:52:40+00:00\",\"description\":\"Just Security's collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1\",\"width\":2560,\"height\":977,\"caption\":\"Collage of images pertaining to artificial intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.justsecurity.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Just Security&#8217;s Artificial Intelligence Archive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.justsecurity.org\/#website\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"name\":\"Just Security\",\"description\":\"A Forum on Law, Rights, and U.S. National Security\",\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.justsecurity.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.justsecurity.org\/#organization\",\"name\":\"Just Security\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"width\":5371,\"height\":1757,\"caption\":\"Just Security\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/JSBlog\/\",\"https:\/\/x.com\/just_security\",\"https:\/\/www.linkedin.com\/company\/just-security-linkedin\/\",\"https:\/\/www.instagram.com\/justsecurityforum\/\",\"https:\/\/www.youtube.com\/@JustSecurityForum\",\"https:\/\/bsky.app\/profile\/justsecurity.org\"],\"description\":\"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.\",\"email\":\"info@justsecurity.org\",\"legalName\":\"Just Security\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/0cc3be094e36c6a47de22010ac814da1\",\"name\":\"Clara Apt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/76dac2d76fb163da12c3bd5099a7f67e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a66912a0286ce52c4a4fbe68366611ebeffeab1597858b8b0173855775bf818b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a66912a0286ce52c4a4fbe68366611ebeffeab1597858b8b0173855775bf818b?s=96&d=mm&r=g\",\"caption\":\"Clara Apt\"},\"description\":\"Clara Apt (LinkedIn - X) is a Junior Emerging Tech and AI Fellow at Just Security and a Public Service Fellow and M.A. student in International Relations at Johns Hopkins University's School of Advanced International Studies, specializing in technology and innovation. In 2025, she interned with the Surveillance Technology Oversight Project (S.T.O.P.) and previously worked at Freedom House and the U.S. Institute of Peace. Her interests include the governance of emerging technologies and implications for human rights, democracy and security. She graduated summa cum laude from New York University, where she double majored in International Relations and Middle Eastern Studies.\",\"url\":\"https:\/\/www.justsecurity.org\/author\/aptclara\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Just Security's Artificial Intelligence Archive","description":"Just Security's collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/","og_locale":"en_US","og_type":"article","og_title":"Just Security's Artificial Intelligence Archive","og_description":"Just Security's collection of articles analyzing the implications of AI for governance, democracy, human rights and warfare.","og_url":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/","og_site_name":"Just Security","article_publisher":"https:\/\/www.facebook.com\/JSBlog\/","article_published_time":"2025-12-15T12:00:45+00:00","article_modified_time":"2025-12-16T19:52:40+00:00","og_image":[{"width":1024,"height":391,"url":"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage1-5.jpg","type":"image\/jpeg"}],"author":"Clara Apt, Brianna Rosen","twitter_card":"summary_large_image","twitter_description":"Just Security's collection of articles analyzing the implications of AI for governance, democracy, human rights and warfare.","twitter_image":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage1-5.jpg?fit=1024%2C391&ssl=1","twitter_creator":"@just_security","twitter_site":"@just_security","twitter_misc":{"Written by":"Clara Apt, Brianna Rosen","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#article","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/"},"author":{"name":"Clara Apt","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/0cc3be094e36c6a47de22010ac814da1"},"headline":"Just Security&#8217;s Artificial Intelligence Archive","datePublished":"2025-12-15T12:00:45+00:00","dateModified":"2025-12-16T19:52:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/"},"wordCount":89,"publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"image":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1","keywords":["Artificial Intelligence (AI)","China","Constitution","content moderation","Data","Data privacy","Democracy","Digital Surveillance","Disinformation","Emerging technology","Europe","European Union","freedom of speech","Great Power Competition","intelligence community","Law of Armed Conflict (LOAC)","Lethal Autonomous Weapons Systems (LAWS)","national security","Regulation","Social Media Platforms","United States (US)"],"articleSection":["AI &amp; Emerging Technology","Artificial Intelligence (AI)","Courts &amp; Litigation","Democracy &amp; Rule of Law","Diplomacy","Human Rights","Intelligence &amp; Surveillance","International Law","Law of Armed Conflict\/IHL","Social Media Platforms"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/","url":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/","name":"Just Security's Artificial Intelligence Archive","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage"},"image":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1","datePublished":"2025-12-15T12:00:45+00:00","dateModified":"2025-12-16T19:52:40+00:00","description":"Just Security's collection of articles analyzing the implications of AI for society, democracy, human rights, and warfare.","breadcrumb":{"@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#primaryimage","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1","width":2560,"height":977,"caption":"Collage of images pertaining to artificial intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/www.justsecurity.org\/99958\/just-securitys-artificial-intelligence-archive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.justsecurity.org\/"},{"@type":"ListItem","position":2,"name":"Just Security&#8217;s Artificial Intelligence Archive"}]},{"@type":"WebSite","@id":"https:\/\/www.justsecurity.org\/#website","url":"https:\/\/www.justsecurity.org\/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.justsecurity.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.justsecurity.org\/#organization","name":"Just Security","url":"https:\/\/www.justsecurity.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/JSBlog\/","https:\/\/x.com\/just_security","https:\/\/www.linkedin.com\/company\/just-security-linkedin\/","https:\/\/www.instagram.com\/justsecurityforum\/","https:\/\/www.youtube.com\/@JustSecurityForum","https:\/\/bsky.app\/profile\/justsecurity.org"],"description":"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.","email":"info@justsecurity.org","legalName":"Just Security"},{"@type":"Person","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/0cc3be094e36c6a47de22010ac814da1","name":"Clara Apt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/76dac2d76fb163da12c3bd5099a7f67e","url":"https:\/\/secure.gravatar.com\/avatar\/a66912a0286ce52c4a4fbe68366611ebeffeab1597858b8b0173855775bf818b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a66912a0286ce52c4a4fbe68366611ebeffeab1597858b8b0173855775bf818b?s=96&d=mm&r=g","caption":"Clara Apt"},"description":"Clara Apt (LinkedIn - X) is a Junior Emerging Tech and AI Fellow at Just Security and a Public Service Fellow and M.A. student in International Relations at Johns Hopkins University's School of Advanced International Studies, specializing in technology and innovation. In 2025, she interned with the Surveillance Technology Oversight Project (S.T.O.P.) and previously worked at Freedom House and the U.S. Institute of Peace. Her interests include the governance of emerging technologies and implications for human rights, democracy and security. She graduated summa cum laude from New York University, where she double majored in International Relations and Middle Eastern Studies.","url":"https:\/\/www.justsecurity.org\/author\/aptclara\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/04\/BeFunky-collage-4-scaled.jpg?fit=2560%2C977&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5gGh3-q0e","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/99958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/users\/2274"}],"replies":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/comments?post=99958"}],"version-history":[{"count":2,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/99958\/revisions"}],"predecessor-version":[{"id":120420,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/99958\/revisions\/120420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media\/100288"}],"wp:attachment":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media?parent=99958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/categories?post=99958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/tags?post=99958"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/coauthors?post=99958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}