CINXE.COM

Introducing the Symposium on AI and Human Rights

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Introducing the Symposium on AI and Human Rights</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.4) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="Explore the intersection of AI and human rights in this new collaboration between Just Security and UCLA&#039;s Promise Institute for Human Rights" /> <link rel="canonical" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Introducing the Symposium on AI and Human Rights" /> <meta property="og:description" content="Introducing a new symposium on the intersection between AI and human rights." /> <meta property="og:url" content="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2024-06-17T12:46:25+00:00" /> <meta property="article:modified_time" content="2024-12-18T14:32:12+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-1-scaled-e1718629233184.jpg" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="576" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Jessica Peake" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:description" content="Introducing a new symposium on the intersection between AI and human rights." /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Jessica Peake" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="6 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#article","isPartOf":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/2a2b3a0908ec4c0d800ad0c8ae8ee36f"}],"headline":"Introducing the Symposium on AI and Human Rights","datePublished":"2024-06-17T12:46:25+00:00","dateModified":"2024-12-18T14:32:12+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/"},"wordCount":1282,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-scaled.jpg?fit=2560%2C1440&ssl=1","keywords":["Artificial Intelligence (AI)","Human Rights","Symposium on AI and Human Rights"],"articleSection":["Artificial Intelligence (AI)","Civil Liberties","Cyber","Cybersecurity","Democracy","Disinformation","Featured Articles","Human Rights","Series","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/","url":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/","name":"Introducing the Symposium on AI and Human Rights","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-scaled.jpg?fit=2560%2C1440&ssl=1","datePublished":"2024-06-17T12:46:25+00:00","dateModified":"2024-12-18T14:32:12+00:00","description":"Explore the intersection of AI and human rights in this new collaboration between Just Security and UCLA's Promise Institute for Human Rights","breadcrumb":{"@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-scaled.jpg?fit=2560%2C1440&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-scaled.jpg?fit=2560%2C1440&ssl=1","width":2560,"height":1440,"caption":"3D Motion graphic of AI or artificial intelligence Innovation Technology concept, AI Font 3D in digital cyber space, AI Chatbot and Generative AI technology, Futuristic abstract background for Business Science and technology."},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"Introducing the Symposium on AI and Human Rights"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","contentUrl":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/2a2b3a0908ec4c0d800ad0c8ae8ee36f","name":"Jessica Peake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/940a56b4935793c4eb0da702c8f4a160","url":"https://secure.gravatar.com/avatar/bc4a0502e818bbeaeba3b0f56604fc69?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/bc4a0502e818bbeaeba3b0f56604fc69?s=96&d=mm&r=g","caption":"Jessica Peake"},"description":"Jess Peake is the Assistant Director of the Promise Institute for Human Rights and the Director of the International and Comparative Law Program at UCLA School of Law. She is an expert on digital investigations, human rights and international criminal law. Jess co-founded the University of California Digital Investigations Network in 2021 and teaches courses on Human Rights and War Crimes Digital Investigations and International Humanitarian Law. She was nominated for a Pulitzer Prize in 2023.","url":"https://www.justsecurity.org/author/peakejessica/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='preconnect' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security &raquo; Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.4 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.4'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/96881\/symposium-on-ai-and-human-rights\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&#038;family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&#038;display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1735053534' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-default-css' href='https://www.justsecurity.org/wp-content/tablepress-combined.min.css?ver=42' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedheader-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedheader.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedcolumns-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedcolumns.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-scroll-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.scroll-buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-rowgroup-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.rowgroup.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-responsive-tables-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/responsive-tables.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-columnfilterwidgets-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.columnfilterwidgets.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-column-filter-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.column-filter.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-datetime-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.datetime.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchbuilder-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchbuilder.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchhighlight-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchhighlight.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-select-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.select.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchpanes-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchpanes.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-serverside-processing-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.serverside-processing.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.18' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='popup-maker-site-css' href='//www.justsecurity.org/wp-content/uploads/pum/pum-site-styles.css?generated=1739227473&#038;ver=1.20.4' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.3' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.3' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.4" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/96881" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-pcB' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F96881%2Fsymposium-on-ai-and-human-rights%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F96881%2Fsymposium-on-ai-and-human-rights%2F&#038;format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.1.1 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&#038;ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&#038;ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&#038;ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&#038;ssl=1" /> </head> <body class="post-template-default single single-post postid-96881 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> <li id="menu-item-107744" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107744"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Admin Litigation Tracker</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#fff"/></svg> </a><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu-mobile-container"><ul id="menu-mobile" class="menu"><li id="menu-item-733" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-733"><a href="https://www.justsecurity.org">Home</a></li> <li id="menu-item-76571" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76571"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-76565" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76565"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-76533" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76533"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-76566" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76566"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76572" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76572"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-106458" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-106458"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> </ul> </li> <li id="menu-item-83989" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83989"><a href="https://www.buzzsprout.com/2074610">NEW: Podcast</a></li> <li id="menu-item-107745" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107745"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Administration Litigation Tracker</a></li> <li id="menu-item-93849" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-93849"><a href="https://www.youtube.com/@JustSecurityForum">YouTube</a></li> <li id="menu-item-82330" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-82330"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94074" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94074"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84715" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84715"><a href="https://www.justsecurity.org/tag/climate-change/">Climate Change</a></li> <li id="menu-item-82331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82331"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-82332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82332"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-82336" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82336"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82354" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82354"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-82338" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82338"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84716" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84716"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-82345" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82345"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-82340" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82340"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-82341" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82341"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-82342" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82342"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> <li id="menu-item-91477" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91477"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82353" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82353"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-82343" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82343"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-82344" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82344"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-82346" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82346"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82542" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82542"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84718" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84718"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-82348" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82348"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-82349" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82349"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> </ul> </li> <li id="menu-item-82351" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-82351"><a href="https://www.justsecurity.org/category/featured-new/">Featured Articles</a></li> <li id="menu-item-76568" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76568"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li id="menu-item-37577" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-37577"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li id="menu-item-76569" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76569"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Signups for A.M. and P.M. emails</a></li> </ul></div></div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/06/GettyImages-1472123000-scaled.jpg?fit=2560%2C1440&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>Introducing the Symposium on AI and Human Rights </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p><p class="date">June 17, 2024</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-bluesky"><a rel="nofollow noopener noreferrer" data-shared="sharing-bluesky-96881" class="share-bluesky sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/?share=bluesky" target="_blank" title="Click to share on Bluesky" ><span></span><span class="sharing-screen-reader-text">Click to share on Bluesky (Opens in new window)</span></a></li><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-96881" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-96881" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-96881" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/artificial-intelligence/" rel="tag">Artificial Intelligence (AI)</a>, <a href="https://www.justsecurity.org/tag/human-rights/" rel="tag">Human Rights</a>, <a href="https://www.justsecurity.org/tag/symposium-on-ai-and-human-rights/" rel="tag">Symposium on AI and Human Rights</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p><p class="date">June 17, 2024</p></div><p><span style="font-weight: 400;">The use of AI is advancing at almost </span><a href="https://www.scientificamerican.com/article/stanford-ai-index-rapid-progress/"><span style="font-weight: 400;">incomprehensible speeds</span></a><span style="font-weight: 400;">, driving decision making that has </span><a href="https://www.amnesty.org/en/latest/campaigns/2024/01/the-urgent-but-difficult-task-of-regulating-artificial-intelligence/"><span style="font-weight: 400;">broad impacts on society</span></a><span style="font-weight: 400;">, and with the potential to dramatically impact human rights. Indeed, AI has the potential to affect nearly every </span><a href="https://www.ohchr.org/en/what-are-human-rights/international-bill-human-rights"><span style="font-weight: 400;">recognized human right</span></a><span style="font-weight: 400;">, including the rights to freedom of expression, thought, assembly, association and movement; the right to privacy and data protection; the rights to health, education, work and an adequate standard of living; and non-discrimination and equality.  AI may also give rise to the need to instantiate new forms of rights, such as the </span><a href="https://www.virginialawreview.org/wp-content/uploads/2020/05/106VaLRev611.pdf"><span style="font-weight: 400;">right to a human decision</span></a><span style="font-weight: 400;">.  </span></p> <p><span style="font-weight: 400;">The human rights abuses that can occur through the implementation of AI systems include </span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/02/02/artificial-intelligence-the-new-eyes-of-surveillance/?sh=5fd41fb414f2"><span style="font-weight: 400;">facilitating mass surveillance</span></a><span style="font-weight: 400;"> as well as perpetuating bias in the </span><a href="https://naacp.org/resources/artificial-intelligence-predictive-policing-issue-brief"><span style="font-weight: 400;">criminal justice system</span></a><span style="font-weight: 400;">, </span><a href="https://medicine.yale.edu/news-article/eliminating-racial-bias-in-health-care-ai-expert-panel-offers-guidelines/"><span style="font-weight: 400;">healthcare</span></a><span style="font-weight: 400;">, </span><a href="https://www.edweek.org/technology/another-ai-issue-for-schools-to-know-about-bias-against-non-native-english-speakers/2023/08?s_kwcid=AL!6416!3!602270476281!!!g!!&amp;utm_source=goog&amp;utm_medium=cpc&amp;utm_campaign=ew+dynamic+recent&amp;ccid=dynamic+ads+recent+articles&amp;ccag=recent+articles+dynamic&amp;cckw=&amp;cccv=dynamic+ad&amp;gad_source=1&amp;gclid=CjwKCAjw34qzBhBmEiwAOUQcF-YXviQ8GerQyOwQ40hT45CDHD1v4wvcXa_3gRilhSvae1R_9uFsohoC7loQAvD_BwE"><span style="font-weight: 400;">education</span></a><span style="font-weight: 400;">, the </span><a href="https://par.nsf.gov/servlets/purl/10281665"><span style="font-weight: 400;">job market</span></a><span style="font-weight: 400;">, access to </span><a href="https://www.newscientist.com/article/2431917-openais-chatbot-shows-racial-bias-in-advising-home-buyers-and-renters/"><span style="font-weight: 400;">housing</span></a><span style="font-weight: 400;">, and access to </span><a href="https://www.ey.com/en_us/insights/forensic-integrity-services/ai-discrimination-and-bias-in-financial-services"><span style="font-weight: 400;">banking</span></a><span style="font-weight: 400;">, thereby exacerbating </span><a href="https://www.lawyerscommittee.org/online-civil-rights-act/?gad_source=1&amp;gclid=CjwKCAjw34qzBhBmEiwAOUQcF3DHB6BS1iDEpA9hlNZc9bq1RheMwidcwfZ4SD4HKmNw0B_8JI4CvRoCR7AQAvD_BwE"><span style="font-weight: 400;">discrimination</span></a><span style="font-weight: 400;"> against already marginalized groups.  AI is also having a negative impact on </span><a href="https://www.politico.eu/sponsored-content/the-impact-of-ai-on-disinformation-and-democracy/"><span style="font-weight: 400;">democracies</span></a><span style="font-weight: 400;"> through facilitating the spread of </span><a href="https://apnews.com/article/artificial-intelligence-elections-disinformation-chatgpt-bc283e7426402f0b4baa7df280a4c3fd"><span style="font-weight: 400;">disinformation</span></a><span style="font-weight: 400;">, the creation of </span><a href="https://this-person-does-not-exist.com/en"><span style="font-weight: 400;">deep-fakes</span></a><span style="font-weight: 400;"> and </span><a href="https://blog.witness.org/2023/02/building-human-rights-oriented-guidelines-for-synthetic-media/"><span style="font-weight: 400;">synthetic media</span></a><span style="font-weight: 400;"> to sow chaos and confusion, and the </span><a href="https://www.bbc.com/news/technology-65755517"><span style="font-weight: 400;">removal of content</span></a><span style="font-weight: 400;"> documenting human rights abuses. At the same time, AI has the potential to benefit human rights, from facilitating advances in </span><a href="https://www.economist.com/technology-quarterly/2024/03/27/can-artificial-intelligence-make-health-care-more-efficient?utm_medium=cpc.adword.pd&amp;utm_source=google&amp;ppccampaignID=17210591673&amp;ppcadID=&amp;utm_campaign=a.22brand_pmax&amp;utm_content=conversion.direct-response.anonymous&amp;gad_source=1&amp;gclid=CjwKCAjw34qzBhBmEiwAOUQcF8e431Qstpb15APysqC6mj041gcRAJlCHwYnRKa4wRhvLqjA-rT8eBoCccwQAvD_BwE&amp;gclsrc=aw.ds"><span style="font-weight: 400;">healthcare</span></a><span style="font-weight: 400;"> to tracking </span><a href="https://www.oecd-ilibrary.org/sites/31e7edcc-en/index.html?itemId=/content/component/31e7edcc-en"><span style="font-weight: 400;">supply chain compliance</span></a><span style="font-weight: 400;">.  </span></p> <p><span style="font-weight: 400;">Both </span><a href="https://www.un.org/en/about-us/udhr/foundation-of-international-human-rights-law#:~:text=By%20becoming%20parties%20to%20international,the%20enjoyment%20of%20human%20rights."><span style="font-weight: 400;">governments</span></a><span style="font-weight: 400;"> and </span><a href="https://www.ohchr.org/sites/default/files/documents/publications/guidingprinciplesbusinesshr_en.pdf"><span style="font-weight: 400;">corporations</span></a><span style="font-weight: 400;"> have a duty to respect human rights. The international human rights regime is an ecosystem of established laws, frameworks, and institutions at the </span><a href="https://www.unicef.org/armenia/en/stories/international-human-rights-framework#:~:text=The%20instruments%20of%20the%20international,Economic%2C%20Social%20and%20Cultural%20Rights"><span style="font-weight: 400;">international</span></a><span style="font-weight: 400;">, </span><a href="https://www.ohchr.org/sites/default/files/Documents/Publications/training9chapter3en.pdf"><span style="font-weight: 400;">regional</span></a><span style="font-weight: 400;">, and domestic levels within which individuals can seek respect for their human rights as well as remedies for human rights violations. Although government and industry leaders often affirm the centrality of human rights in the development and deployment of “responsible” AI systems, all too often this takes the form of general principles or statements that are either difficult to implement in practice or neglect to consider the full range of potential use cases. As advances in AI accelerate, human rights need to be integrated into every level of</span><a href="https://www.carnegiecouncil.org/media/article/human-rights-ai-technology-governance"><span style="font-weight: 400;"> AI governance</span></a><span style="font-weight: 400;"> regimes. </span></p> <p><span style="font-weight: 400;">In February 2024, the </span><a href="https://promiseinstitute.law.ucla.edu/"><span style="font-weight: 400;">Promise Institute for Human Rights at UCLA School of Law</span></a><span style="font-weight: 400;"> convened a </span><a href="https://promiseinstitute.law.ucla.edu/symposium/human-rights-and-artificial-intelligence/"><span style="font-weight: 400;">symposium on </span><i><span style="font-weight: 400;">Human Rights and Artificial Intelligence</span></i></a><i><span style="font-weight: 400;">, </span></i><span style="font-weight: 400;">bringing together leading experts to examine some of the critical questions arising from the rapid expansion of AI and the lagging governance models. The purpose of this symposium – a collaboration between the Promise Institute and </span><i><span style="font-weight: 400;">Just Security </span></i><span style="font-weight: 400;">– is to share some of the insights captured by our speakers with a broader audience, and to elevate some of the most pressing questions about the relationship between AI and human rights.</span></p> <p><span style="font-weight: 400;">New articles in the series will run each week, tying together the following themes:</span></p> <h2><b>Generative AI and Human Rights </b></h2> <ul> <li><b><i>Raquel Vazquez Llorente and Yvonne McDermott Rees, “</i></b><b><i><a href="https://www.justsecurity.org/96731/truth-trust-and-ai-justice-and-accountability/">Truth, Trust, and AI: Justice and Accountability for International Crimes in the Era of Digital Deception</a>.” </i></b>Drawing on their deep expertise of synthetic media – artificially produced or manipulated text, image, audio or video – and its impact, Llorente and McDermott Rees highlight how the use of deep fakes has the potential to undermine trust in the online information ecosystem. They point to concerns about the “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3213954">liars dividend</a>,” which creates an environment where deepfake content can both make it easier to question the veracity of all content and act as a mechanism to further entrench beliefs and narratives. They explore what impact AI-generated content may have on justice and accountability for human rights violations and suggest some ways in which we can prepare for a hybrid AI-human media ecosystem.</li> <li><b><i>Shannon Raj Singh, “</i></b><b><i><a href="https://www.justsecurity.org/96924/generative-ai-and-the-sale-of-digital-authenticity/">What Happens When We Get What We Pay for: Generative AI and the Sale of Digital Authenticity</a>.”</i></b><span style="font-weight: 400;"> Coupled with the rise of deepfakes, Singh writes about how the degeneration of verified accounts – a visual indicator historically used to show that the account is from a trusted source such as a legitimate media outlet or public figure – is leading to an overall crisis about the legitimacy of our information environment. She stresses that social media account verification should be considered a public good as it allows us to know what information to trust, and that social media users are not well equipped for the “coming wave of AI-generated misinformation” under the current pay-to-play verification system.</span></li> <li><b><i>Natasha Amlani, “<a href="https://www.justsecurity.org/97065/ai-anti-child-sexual-exploitation/">AI Exploitation and Child Sexual Abuse: The Need for Safety by Design</a>.”</i></b> <span style="font-weight: 400;">Continuing our exploration of the impact of AI generated materials on human rights, Amlani’s piece challenges us to think about the ways in which deepfake child sexual abuse imagery affects child safety and the impact on the child safety reporting system. To mitigate some of these harms, she implores tech companies to start thinking about safety by design when launching new products and features that have the potential to impact children.</span></li> </ul> <h2><b>The Impact of AI on Marginalized Communities  </b></h2> <ul> <li style="font-weight: 400;"><b><i>Rebecca Hamilton, “<a href="https://www.justsecurity.org/96534/environmental-impacts-of-ai/">The Missing AI Conversation We Need to Have: Environmental Impacts of Generative AI</a>.” </i></b><span style="font-weight: 400;">Hamilton reveals the hard truths about the environmental impact of generative AI as it consumes vast quantities of energy and water. She notes that the communities most likely to be impacted are those already most marginalized, particularly in the Global South, and that the narrative of AI development needs to be rewritten to ensure that these high environmental costs are understood by the global community.</span></li> <li style="font-weight: 400;"><b><i>S. Priya Morley, “<a href="https://www.justsecurity.org/97172/ai-at-the-border/">AI at the Border: Racialized Impact and Implications</a></i></b><i><span style="font-weight: 400;">.” </span></i><span style="font-weight: 400;">Morley examines how AI is being used as the latest tool of U.S. border externalization policies that impede migrants from reaching U.S. territory and seeking asylum, as well as a tool to continue surveillance at and within borders. She argues that AI is exacerbating and compounding the racial discrimination already driving these policies, having a particularly harmful impact on Black migrants.</span></li> </ul> <h2><b>AI Governance, Rights, and International Law </b></h2> <ul> <li style="font-weight: 400;"><b><i>Michael Karanicolas, “</i></b><b><i><a href="https://www.justsecurity.org/96988/governments-use-of-ai-is-expanding/">Governments’ Use of AI is Expanding: We Should Hope for the Best but Safeguard Against the Worst</a>.”</i></b> <span style="font-weight: 400;">Karanicolas examines how AI expansion across U.S. government agencies has the potential to chip away at fundamental rights. He underscores the need to ensure appropriate oversight of AI tools, and suggests a couple of different models for how that could be structured. In particular, he recommends the creation of a specialized, independent, multi-stakeholder body that can push back against poor decision making to ensure transparency and increase public trust in AI systems.</span></li> <li style="font-weight: 400;"><b><i>Sarah Shirazyan and Miranda Sissons, “How can AI Empower People to Exercise Rights and Freedoms Guaranteed under International Human Rights Law?” </i></b><span style="font-weight: 400;">Writing from the perspective of team members at Meta, Shirazyan and Sissons discuss some of the ways in which AI can empower the rights and freedoms guaranteed through international human rights law. In particular, they explore how AI can strengthen freedom of opinion and expression through improving access to information, skills, knowledge and empowering expression; freedom of equality and non-discrimination through increasing accessibility and language inclusivity, and; freedom from physical and psychological harm through AI-driven consistent content moderation and protecting human moderators from the most harmful content. </span></li> <li style="font-weight: 400;"><b><i>Marlena Wisniak and Matt Mahmoudi, “<a href="https://www.justsecurity.org/97645/beyond-ai-safety-narratives/">Beyond AI Safety Narratives: How to Craft Tech-Agnostic and Neo-Luddite Futures</a>.” </i></b><span style="font-weight: 400;">Human rights advocates Wisniak and Mahmoudi pronounce that our future must be centered on social justice and the realization of rights, rather than the pursuit of techno-solutionism – the idea that technology can solve any problem – driven by AI. They underscore how approaches to AI governance must be grounded in the existing international human rights law framework, which provides substantive and procedural rights that can protect individuals from some of the worst potential impacts of AI.</span></li> </ul> <p><span style="font-weight: 400;">Taken together, this symposium provides a rich picture of how AI can be used both to uphold and violate human rights.  Widespread AI use is inevitable – policymakers must move quickly to ensure fundamental rights and freedoms are protected around the world.</span></p> <h6><em>IMAGE: Abstract rendering of AI (via GettyImages). </em><br style="font-weight: 400;" /><br style="font-weight: 400;" /></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/artificial-intelligence/" rel="tag">Artificial Intelligence (AI)</a>, <a href="https://www.justsecurity.org/tag/human-rights/" rel="tag">Human Rights</a>, <a href="https://www.justsecurity.org/tag/symposium-on-ai-and-human-rights/" rel="tag">Symposium on AI and Human Rights</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible &#8212; But Perhaps the Point? A Case Study</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/">The Need for Course Correction: The Risks of Treating Drug Cartels as Terrorist Threats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/harvindonell/" title="Profile and articles by Donell Harvin" class="author url fn" rel="author">Donell Harvin</a></p> <p class="date">Feb 12th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107245/deepseek-ai-competition/">What DeepSeek Really Changes About AI Competition</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pilzkonstantinf/" title="Profile and articles by Konstantin F. Pilz" class="author url fn" rel="author">Konstantin F. Pilz</a> and <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a></p> <p class="date">Feb 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107267/can-president-dissolve-usaid-by-executive-order/">Can the President Dissolve USAID by Executive Order?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Feb 1st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107110/trump-purge-justice-department/">The Real Reason Trump’s Purge of Career DOJ Officials Should Alarm You</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/zdebsara/" title="Profile and articles by Sara Zdeb" class="author url fn" rel="author">Sara Zdeb</a></p> <p class="date">Jan 30th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107094/deferred-resignation-dubious-federal-employees/">Beware the &#8220;Deferred Resignation&#8221; Offer: A Legally Dubious Proposal for Federal Employees</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/summerlinsuzanne/" title="Profile and articles by Suzanne Summerlin" class="author url fn" rel="author">Suzanne Summerlin</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107030/invasion-executive-order-military-authorities/">What Just Happened: The Framing of a Migration “Invasion” and the Use of Military Authorities</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bankswilliam/" title="Profile and articles by William Banks" class="author url fn" rel="author">William Banks</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107029/fbi-director-weaponization-government-executive-order/">Understanding Trump’s Choice for FBI Leadership in Light of the“Weaponization of the Federal Government” Executive Order</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gersonstuart/" title="Profile and articles by Stuart M. Gerson" class="author url fn" rel="author">Stuart M. Gerson</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106969/trump-dictatorial-theory-presidential-power-executive-orders/">Trump’s Dictatorial Theory of Presidential Power &#8211; What the Executive Orders, in the Aggregate, Tell Us</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/morrisontrevor/" title="Profile and articles by Trevor Morrison" class="author url fn" rel="author">Trevor Morrison</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106953/invasion-executive-order-implications/">What Just Happened: The “Invasion” Executive Order and Its Dangerous Implications</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106919/stopped-security-assistance/">Stopped Security Assistance: From Counter-Narcotics to Combating Human Trafficking Programs</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/randdafnah/" title="Profile and articles by Dafna H. Rand" class="author url fn" rel="author">Dafna H. Rand</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106856/international-criminal-court-call-for-justice/">We Need the International Legal Order: A Call to Protect the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/iccasppresidents/" title="Profile and articles by The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court" class="author url fn" rel="author">The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106775/israel-hamas-ceasefire/">Israel-Hamas Ceasefire: Temporary Reprieve or Sustainable Peace?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/millerandrew/" title="Profile and articles by Andrew Miller" class="author url fn" rel="author">Andrew Miller</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106846/syria-international-criminal-court/">Syria Needs the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rothkenneth/" title="Profile and articles by Kenneth Roth" class="author url fn" rel="author">Kenneth Roth</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106804/what-just-happened-trumps-executive-actions-us-climate-security/">What Just Happened: Trump’s Executive Actions on Environment and Implications for US Climate Security</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ellisontom/" title="Profile and articles by Tom Ellison" class="author url fn" rel="author">Tom Ellison</a></p> <p class="date">Jan 24th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106738/trump-privacy-oversight-board-surveillance/">What Just Happened: What Trump&#8217;s Hobbling of the Privacy Oversight Board Portends for Exercise of Surveillance Powers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106689/january-6-pardons-statistics/">What Just Happened: Trump’s January 6 Pardons and Assaults on Law Enforcement Officers By The Numbers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106593/national-emergency-southern-border-order/">What Just Happened: Unpacking Exec Order on National Emergency at the Southern Border</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nevittmark/" title="Profile and articles by Mark Nevitt" class="author url fn" rel="author">Mark Nevitt</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106627/what-just-happened-with-icc-sanctions/">What Just Happened: With ICC Sanctions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106567/bidens-cybersecurity-eo-what-comes-next-trump/">Biden’s Cybersecurity Executive Order and What Comes Next Under Trump</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106509/georgia-protests-trump-influence/">Crisis in Georgia: Why the Trump Administration Should Step In To Shore Up US Influence</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a> and <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a></p> <p class="date">Jan 17th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106427/unpacking-the-biden-administrations-executive-order-on-ai-infrastructure/">Unpacking the Biden Administration’s Executive Order on AI Infrastructure</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jan 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106278/highlights-jack-smith-january-6th-final-report/">3 Highlights in Special Counsel Jack Smith&#8217;s Final Report on 2020 Election Subversion Case</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106313/questions-pam-bondi-attorney-general/">Questions for Senators (And Journalists) to Ask Attorney General Nominee Pam Bondi</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106317/questions-rubio-secretary-of-state-nominee/">Questions for Senators (and Journalists) to Ask Secretary of State Nominee Marco Rubio</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106283/how-not-to-decide-tiktok-u-s-press-freedom-hangs-in-the-balance/">How Not to Decide TikTok: U.S. press freedom hangs in the balance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coledavid/" title="Profile and articles by David Cole" class="author url fn" rel="author">David Cole</a></p> <p class="date">Jan 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106247/inspector-general-january-6th/">Unpacking the Inspector General Report on January 6th and FBI “False Flag” Conspiracies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 10th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106146/national-security-resilience-reform/">National Security Resilience and Reform: Trump 2.0 and Beyond</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Jan 8th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106105/announcement-ai-emerging-technologies-initiative/">Announcing Just Security’s Artificial Intelligence and Emerging Technologies Initiative</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 6th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105879/suing-taliban-icj-abuses-afghan-women/">Suing the Taliban at the ICJ Over Abuses of Afghan Women Isn’t a Panacea. Countries Must Do More Now.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/huckerbyjayne/" title="Profile and articles by Jayne Huckerby" class="author url fn" rel="author">Jayne Huckerby</a></p> <p class="date">Jan 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105991/just-security-2024-book-recommendations/">The Just Security 2024 Year-End Book Recommendations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Dec 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105981/ukraine-russia-human-safari-tactic/">Russia’s “Human Safari” Terror Tactic in Key Southeastern Ukraine Region of Kherson</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sapuppomercedes/" title="Profile and articles by Mercedes Sapuppo" class="author url fn" rel="author">Mercedes Sapuppo</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105944/us-iran-diplomacy-nuclear/">U.S. Options for Iran Diplomacy in 2025</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/davenportkelsey/" title="Profile and articles by Kelsey Davenport" class="author url fn" rel="author">Kelsey Davenport</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105917/interim-report-icj-climate-opinion/">An Interim Report on the ICJ’s Climate Advisory Opinion</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hericorina/" title="Profile and articles by Corina Heri" class="author url fn" rel="author">Corina Heri</a></p> <p class="date">Dec 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105909/challenging-china-human-rights/">New Challenges to Xi Jinping’s Alternative Facts on Taiwan: Lessons for the Human Rights Space, Too</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/richardsonsophie/" title="Profile and articles by Sophie Richardson" class="author url fn" rel="author">Sophie Richardson</a></p> <p class="date">Dec 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105752/ai-presidency/">The AI Presidency: What “America First” Means for Global AI Governance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Dec 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105735/trump-administration-sanctions-africa/">The First Trump Administration Used Sanctions Effectively in Africa. Here’s How That Can Resume in the Second Term.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Dec 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105708/icc-standard-proof-head-state/">Does the Int’l Criminal Court Impose Too Low a Standard of Proof to Arrest a Head of State?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a> and <a href="https://www.justsecurity.org/author/trumbullcharlie/" title="Profile and articles by Charlie Trumbull" class="author url fn" rel="author">Charlie Trumbull</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105638/biden-bosnia-security-troops/">Biden’s Unfinished Business: A Bridge to Shore Up a European Flank – in the Balkans</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bassuenerkurt/" title="Profile and articles by Kurt Bassuener" class="author url fn" rel="author">Kurt Bassuener</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105640/georgia-protests-us-sanctions/">Georgia Risks Falling to a Violent One-Party Regime. The Biden Administration Must Act Now to Stop Its Slide.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105627/syria-freedom-governance-local-approach-constitutionalism/">Syrians’ Pursuit of Freedom and Self-Governance: Prioritizing a Locally-Driven and Incremental Approach to Constitutionalism</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alrwishdideyaa/" title="Profile and articles by Deyaa Alrwishdi" class="author url fn" rel="author">Deyaa Alrwishdi</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105593/foreign-agent-laws-impact/">The Spreading Impact of Restrictive ‘Foreign Agent’ Laws and How to Stop Them</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/cameronjasmine/" title="Profile and articles by Jasmine D. Cameron" class="author url fn" rel="author">Jasmine D. Cameron</a> and <a href="https://www.justsecurity.org/author/nicolafernandag/" title="Profile and articles by Fernanda G. Nicola" class="author url fn" rel="author">Fernanda G. Nicola</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105552/public-framing-mass-deportation/">The Public Framing of Mass Deportation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105538/interpol-transparency-reform/">Interpol General Assembly Inches Forward on Transparency, Still Needs Reform Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a> and <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105406/georgia-protests-letter-us-diplomats/">Open Letter on Georgia from Former US Diplomats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/herbstjohne/" title="Profile and articles by Ambassador (ret) John E. Herbst" class="author url fn" rel="author">Ambassador (ret) John E. Herbst</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105321/military-immigration-enforcement-deportation/">Deployment of the U.S. Military for Immigration Enforcement: A Primer</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105181/drones-graves-mexicos-disappeared/">Camera-Fitted Drones May Help Locate Graves of Mexico’s Disappeared</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/garciareyeskarina/" title="Profile and articles by Karina García-Reyes" class="author url fn" rel="author">Karina García-Reyes</a> and <a href="https://www.justsecurity.org/author/moctezumamiguel/" title="Profile and articles by Miguel Moctezuma" class="author url fn" rel="author">Miguel Moctezuma</a></p> <p class="date">Nov 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105176/birthright-citizenship-undocumented-immigrants-2/">Birthright Citizenship and Undocumented Immigrants</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Nov 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts &#038; Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To &#8216;End&#8217; War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine &#8212; and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon&#8217;s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia&#8217;s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who&#8217;s Who in Jack Smith&#8217;s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN&#8217;s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Litigation Tracker: Legal Challenges to Trump Administration Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia&#8217;s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis &#038; Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine &#8211; The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security&#8217;s Series on Reparations in Russia&#8217;s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the &#8220;War on Terror&#8221;</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 &#8220;Report Card&#8221; Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/peakejessica/">Jessica <span>Peake</span></a></h4><p>Jess Peake is the Assistant Director of the Promise Institute for Human Rights and the Director of the International and Comparative Law Program at UCLA School of Law.</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107832/us-china-standoff-afghanistan-un/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/china-security-council-e1739452564443.jpg?fit=768%2C269&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107832/us-china-standoff-afghanistan-un/">US-China Standoff on Who Runs the Afghanistan File at UN Signals Greater Tensions Ahead</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/China-Uyghur-homes-scaled-e1739461476251.jpg?fit=768%2C303&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Georgia-protests-police-scaled-e1739431019325.jpg?fit=768%2C282&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible &#8212; But Perhaps the Point? A Case Study</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2176222391-scaled.jpg?fit=768%2C441&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107813/podcast-artificial-intelligence-action-summit/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Screenshot-2025-02-12-at-1.04.13%E2%80%AFPM.png?fit=677%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107813/podcast-artificial-intelligence-action-summit/">The Just Security Podcast: Key Takeaways from the Paris AI Action Summit</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Feb 12th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/04/BeFunky-collage-4-scaled.jpg?fit=768%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/">Just Security&#8217;s Artificial Intelligence Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Feb 11th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107687/statement-trump-international-law-human-rights/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1668652051-1-scaled.jpg?fit=768%2C441&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107687/statement-trump-international-law-human-rights/">&#8220;The Trump Administration&#8217;s Attacks on International Law and Institutions&#8221;: Public Statement of American Human Rights Experts, Current and Former Members of UN Bodies</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/currentandformermembersofunbodies/" title="Profile and articles by 16 US Human Rights Experts, Current and Former Members of UN Bodies" class="author url fn" rel="author">16 US Human Rights Experts, Current and Former Members of UN Bodies</a></p> <p class="date">Feb 10th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107612/just-security-podcast-repression-lawyers-belarus/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Screenshot-2025-02-07-at-9.51.41%E2%80%AFAM.png?fit=768%2C354&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107612/just-security-podcast-repression-lawyers-belarus/">The Just Security Podcast: Repression of Lawyers in Belarus and Around the World</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/muiznieksnils/" title="Profile and articles by Nils Muiznieks" class="author url fn" rel="author">Nils Muiznieks</a>, <a href="https://www.justsecurity.org/author/polovinkomaksim/" title="Profile and articles by Maksim Polovinko" class="author url fn" rel="author">Maksim Polovinko</a>, <a href="https://www.justsecurity.org/author/satterthwaitemeg/" title="Profile and articles by Meg Satterthwaite" class="author url fn" rel="author">Meg Satterthwaite</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Feb 7th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107571/solidarity-stranglehold-belarusian-lawyers/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2195448311-scaled-e1738894042671.jpg?fit=768%2C411&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107571/solidarity-stranglehold-belarusian-lawyers/">Solidarity Needed Amid Stranglehold on Belarusian Lawyers</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/muiznieksnils/" title="Profile and articles by Nils Muiznieks" class="author url fn" rel="author">Nils Muiznieks</a>, <a href="https://www.justsecurity.org/author/satterthwaitemeg/" title="Profile and articles by Meg Satterthwaite" class="author url fn" rel="author">Meg Satterthwaite</a> and <a href="https://www.justsecurity.org/author/sonnetaloysia/" title="Profile and articles by Aloysia Sonnet" class="author url fn" rel="author">Aloysia Sonnet</a></p> <p class="date">Feb 7th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/105395/qa-mariejte-schaake-on-tech-coup-trump/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2194353649-scaled-e1738769319608.jpg?fit=768%2C376&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/105395/qa-mariejte-schaake-on-tech-coup-trump/">Q&#038;A with Marietje Schaake on the Tech Coup and Trump</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/schaakemarietje/" title="Profile and articles by Marietje Schaake" class="author url fn" rel="author">Marietje Schaake</a></p> <p class="date">Feb 6th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107337/just-security-podcast-diving-deeper-into-deepseek/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Screenshot-2025-02-04-at-8.56.32%E2%80%AFAM-e1738678064827.png?fit=768%2C401&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107337/just-security-podcast-diving-deeper-into-deepseek/">The Just Security Podcast: Diving Deeper into DeepSeek</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a>, <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a>, <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a>, <a href="https://www.justsecurity.org/author/wagnerlauren/" title="Profile and articles by Lauren Wagner" class="author url fn" rel="author">Lauren Wagner</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Feb 4th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107245/deepseek-ai-competition/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/01/GettyImages-2196335619-scaled-e1738355719980.jpg?fit=768%2C406&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107245/deepseek-ai-competition/">What DeepSeek Really Changes About AI Competition</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/pilzkonstantinf/" title="Profile and articles by Konstantin F. Pilz" class="author url fn" rel="author">Konstantin F. Pilz</a> and <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a></p> <p class="date">Feb 3rd, 2025</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#2D8097"/></svg></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">&copy; 2025 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <div id="pum-107566" role="dialog" aria-modal="false" aria-labelledby="pum_popup_title_107566" class="pum pum-overlay pum-theme-107555 pum-theme-default-theme-2 popmake-overlay pum-overlay-disabled auto_open click_open" data-popmake="{&quot;id&quot;:107566,&quot;slug&quot;:&quot;finding-our-content-helpful&quot;,&quot;theme_id&quot;:107555,&quot;cookies&quot;:[{&quot;event&quot;:&quot;on_popup_close&quot;,&quot;settings&quot;:{&quot;name&quot;:&quot;pum-107566&quot;,&quot;time&quot;:&quot;1 week&quot;,&quot;path&quot;:true}}],&quot;triggers&quot;:[{&quot;type&quot;:&quot;auto_open&quot;,&quot;settings&quot;:{&quot;cookie_name&quot;:[&quot;pum-107566&quot;],&quot;delay&quot;:&quot;30000&quot;}},{&quot;type&quot;:&quot;click_open&quot;,&quot;settings&quot;:{&quot;extra_selectors&quot;:&quot;&quot;,&quot;cookie_name&quot;:null}}],&quot;mobile_disabled&quot;:null,&quot;tablet_disabled&quot;:null,&quot;meta&quot;:{&quot;display&quot;:{&quot;stackable&quot;:&quot;1&quot;,&quot;overlay_disabled&quot;:&quot;1&quot;,&quot;scrollable_content&quot;:false,&quot;disable_reposition&quot;:false,&quot;size&quot;:&quot;custom&quot;,&quot;responsive_min_width&quot;:&quot;0px&quot;,&quot;responsive_min_width_unit&quot;:false,&quot;responsive_max_width&quot;:&quot;100px&quot;,&quot;responsive_max_width_unit&quot;:false,&quot;custom_width&quot;:&quot;300px&quot;,&quot;custom_width_unit&quot;:false,&quot;custom_height&quot;:&quot;380px&quot;,&quot;custom_height_unit&quot;:false,&quot;custom_height_auto&quot;:&quot;1&quot;,&quot;location&quot;:&quot;right bottom&quot;,&quot;position_from_trigger&quot;:false,&quot;position_top&quot;:&quot;100&quot;,&quot;position_left&quot;:&quot;0&quot;,&quot;position_bottom&quot;:&quot;10&quot;,&quot;position_right&quot;:&quot;10&quot;,&quot;position_fixed&quot;:&quot;1&quot;,&quot;animation_type&quot;:&quot;slide&quot;,&quot;animation_speed&quot;:&quot;350&quot;,&quot;animation_origin&quot;:&quot;bottom&quot;,&quot;overlay_zindex&quot;:false,&quot;zindex&quot;:&quot;1999999999&quot;},&quot;close&quot;:{&quot;text&quot;:&quot;&quot;,&quot;button_delay&quot;:&quot;0&quot;,&quot;overlay_click&quot;:false,&quot;esc_press&quot;:false,&quot;f4_press&quot;:false},&quot;click_open&quot;:[]}}"> <div id="popmake-107566" class="pum-container popmake theme-107555 size-custom pum-position-fixed"> <div id="pum_popup_title_107566" class="pum-title popmake-title"> Finding our content helpful? </div> <div class="pum-content popmake-content" tabindex="0"> <p><em>Just Security</em> is a non-profit, daily, digital law and policy journal that elevates the discourse on security, democracy and rights. We rely on donations from readers like you. Please consider supporting us with a tax-deductible donation today.<br /> <a class="button" style="margin-top: 15px;" href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" target="_blank" rel="noopener">Donate Now</a></p> </div> <button type="button" class="pum-close popmake-close" aria-label="Close"> CLOSE </button> </div> </div> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/96881\/symposium-on-ai-and-human-rights\/":96881}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1739732953" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" id="popup-maker-site-js-extra"> /* <![CDATA[ */ var pum_vars = {"version":"1.20.4","pm_dir_url":"https:\/\/www.justsecurity.org\/wp-content\/plugins\/popup-maker\/","ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","restapi":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1","rest_nonce":null,"default_theme":"107546","debug_mode":"","disable_tracking":"","home_url":"\/","message_position":"top","core_sub_forms_enabled":"1","popups":[],"cookie_domain":"","analytics_route":"analytics","analytics_api":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1"}; var pum_sub_vars = {"ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","message_position":"top"}; var pum_popups = {"pum-107566":{"triggers":[{"type":"auto_open","settings":{"cookie_name":["pum-107566"],"delay":"30000"}}],"cookies":[{"event":"on_popup_close","settings":{"name":"pum-107566","time":"1 week","path":true}}],"disable_on_mobile":false,"disable_on_tablet":false,"atc_promotion":null,"explain":null,"type_section":null,"theme_id":"107555","size":"custom","responsive_min_width":"0px","responsive_max_width":"100px","custom_width":"300px","custom_height_auto":true,"custom_height":"380px","scrollable_content":false,"animation_type":"slide","animation_speed":"350","animation_origin":"bottom","open_sound":"none","custom_sound":"","location":"right bottom","position_top":"100","position_bottom":"10","position_left":"0","position_right":"10","position_from_trigger":false,"position_fixed":true,"overlay_disabled":true,"stackable":true,"disable_reposition":false,"zindex":"1999999999","close_button_delay":"0","fi_promotion":null,"close_on_form_submission":false,"close_on_form_submission_delay":"0","close_on_overlay_click":false,"close_on_esc_press":false,"close_on_f4_press":false,"disable_form_reopen":false,"disable_accessibility":false,"theme_slug":"default-theme-2","id":107566,"slug":"finding-our-content-helpful"}}; /* ]]> */ </script> <script type="text/javascript" src="//www.justsecurity.org/wp-content/uploads/pum/pum-site-scripts.js?defer&amp;generated=1739227473&amp;ver=1.20.4" id="popup-maker-site-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202507.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"96881\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.3\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "96881" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.3" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-bluesky' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-bluesky' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcombluesky', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <style> </style> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10