AI & Emerging Technology
Cyber
456 Articles
“Virtual Iowa Caucuses” Demand Cybersecurity Attention: 2020 Election Security Can’t Wait Till 2020
The past week featured stark reminders of the importance of election security as the 2020 presidential election swiftly approaches. First, former Special Counsel Robert Mueller…

Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II
Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part I
On June 11, 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded beyond countering election interference to…

Empathy Matters: Leadership in Cyber
"Having both served in the U.S. Department of Defense in the post-9/11 era, we’ve found ourselves in far-flung outposts around the world, where Americans and Coalition partners…

Cyberattack Attribution and the Virtues of Decentralization
In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched…

Top Expert Backgrounder: Aborted U.S. Strike, Cyber Operation Against Iran and International Law
"It is difficult to definitely conclude that the proposed U.S. kinetic strikes would have been valid exercises of self-defense."

When Constitutional Law and Government Hacking Collide: A Landmark U.K. Ruling Is Relevant on Both Sides of the Pond
The U.K. Supreme Court's landmark judgment in R (Privacy International) v Investigatory Powers Tribunal and others sets an important precedent for oversight of questions of law…

U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?
Emplacing malware in critical infrastructure on which the civilian population depends is a decision States must not take lightly. It may also violate international law, but 'responding…

Estonia Speaks Out on Key Rules for Cyberspace
Estonian President Kaljulaid stakes out a bold position on collective countermeasures in cyberspace and clarifies the obligation of due diligence.

Countering Russia’s Malign Influence Operations
Putin’s successes with covert action show that such operations are not only more effective and cheaper than conventional military operations, but they have also resulted in far…

An Emergency or Business as Usual? Huawei and Trump’s Emergency Powers
Should the emergency declaration be used purely as leverage in a trade war, it would clearly be an abuse of the intent of emergency powers.