AI & Emerging Technology

Cyber

× Clear Filters
454 Articles
Germany's deputy permanent representative to the UN Jürgen Schulz, France's permanent representative to the UN, Nicolas de Rivière, Britain's permanent representative to the UN, Karen Pierce, Poland's permanent representative to the UN, Joanna Wronecka, and Belgium's permanent representative to the UN, Marc Pecsteen speak to the press at the United Nations Headquarters in New York on November 20, 2019 about the security situation in Israel prior to a Security Council meeting on the "situation in the Middle East, including the Palestinian question."

National Security at the United Nations This Week

Security Council members condemn US policy shift on Israeli settlements, a Russia-sponsored cyber agreement that could pave the way for more Internet censorship moves forward,…
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland.

Reassessing U.S. Cyber Operations Against Iran and the Use of Force

"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."
The Netherlands' Minister of Foreign Affairs Stef Blok speaks during a debate about Socialist Party (SP) party chairman Murat Memis at the Senate, in The Hague, on December 26, 2019.

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis

The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…
A mobile browser unable to connect to Facebook.

Contesting the Legality of Internet Shutdowns

As government communications shutdowns become more frequent, legal challenges citing international human rights law and domestic constitutional protections are also on the rise.…
Binary code lit up in blue lights

An Overview of International Humanitarian Law in France’s New Cyber Document

France's positions explained - with translations of key text - on important issues like the meaning of "attack" and the application of the principles of distinction and proportionality…
A map of France with binary computer code.

France’s Major Statement on International Law and Cyber: An Assessment

Leading expert on international law and cyberspace assesses major new position staked out by French government.
Rally attendees cast shadows as they hold campaign signs during a rally held by 2020 Democratic Presidential hopeful Senator Kamala Harris (D-CA) in Davenport, Iowa on August 12, 2019.

Calling Off Iowa’s “Digital Caucuses” Is a Wise Display of Caution

DNC decision to block Iowa digital caucus deserves praise writes cybersecurity expert.
A phone with the apps, Twitter, Messenger, Google, Google+, Gmail, Facebook, Instagram, and Snapchat.

Corporate Defenses Against Information Warfare

When asked about Russian election interference during his congressional testimony last month, Robert Mueller said: “They’re doing it as we sit here.” We now know that part…
A picture taken on October 17, 2016 shows an employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow.

Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act

Recently, a federal judge in New York dismissed the Democratic National Committee’s (DNC) civil lawsuit against Russia, Wikileaks, and others stemming from the 2016 cyber-attack…
An electronic version of the Mueller Report with redactions regarding the Internet Research Agency is seen on a cellphone outside the White House April 18, 2019, in Washington, DC.

How Secrecy Undermines Mueller and the Defense of Democracy

Official secrecy can diminish democratic discourse, limit debate, and blind the Congress and the public to the nature of the most imminent threats to democracy, all in the name…
Just Security

“Virtual Iowa Caucuses” Demand Cybersecurity Attention: 2020 Election Security Can’t Wait Till 2020

The past week featured stark reminders of the importance of election security as the 2020 presidential election swiftly approaches. First, former Special Counsel Robert Mueller…
A participant attends the 34C3 Chaos Communication Congress of the Chaos Computer Club on December 27, 2017 in Leipzig, Germany.

Why the Ghost Keys ‘Solution’ to Encryption is No Solution

The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…
1-12 of 454 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: