AI & Emerging Technology
Cyber
454 Articles

All Hands on Deck: Cyber Attacks Against Private Companies and International Law
Last Wednesday, reports surfaced that the U.S. aircraft manufacturer Boeing had been hit by a serious ransomware attack. A leaked internal memo suggested that some production equipment…

How to Move the Battle Lines in the Crypto-Wars
Get ready for another round of the crypto-wars. A recent report in the New York Times indicates that the Justice Department has been quietly discussing with researchers ways to…

Zero Shades of Grey: Russian-Ops Violate International Law
A lot more is known since January 2017 when I wrote a piece for Just Security arguing that the Russian interference in the 2016 U.S. election should be interpreted as a violation…

Mr. Zuckerberg, Here’s How You Should Be Regulated
On Wednesday, Mark Zuckerberg finally ended days of silence and set out on a media tour to explain Facebook’s role in the Cambridge Analytica data scandal. CNN’s Laurie Segall…

Why the CLOUD Act is Good for Privacy and Human Rights
Above: Lawyer Joshua Rosenkranz and Brad Smith, President and Chief Legal Officer of Microsoft, speak to reporters following oral arguments in the U.S. v. Microsoft case at the…

Four Common Sense Fixes to the CLOUD Act that its Sponsors Should Support
Congress is quietly but intensively debating the CLOUD Act, a bill which would have a serious impact on privacy rights, and it may be attached to an omnibus spending bill this…

New Bill That Would Give Foreign Governments a Fast Track to Access Data
Increasingly, foreign governments have complained that the MLAT process in the U.S. is slow and that it allows the U.S. Government as a gatekeeper of electronic data. The CLOUD…

Putin’s Story of What Happened in 2016 Sounds Familiar
Where have I heard that story before? Tonight, NBC will air an hour-long special featuring a sit-down interview between Megyn Kelly and Russian President Vladimir Putin. A preview…

Cyber Operations and the U.S. Definition of “Armed Attack”
[Ed. Note: Based on Goodman's remarks at U.S. Cyber Command’s Annual Legal Conference.]
A widely accepted view of the UN Charter is that a State can use force…
A widely accepted view of the UN Charter is that a State can use force…

The EWI Encryption Report: Stop Trying to Sell Me a Shoebox
Which would you prefer: keeping your valuables in a locked safe, or keeping them in a shoebox and trusting that everyone will adhere to laws against theft and their concomitant…

Do Not Pass Go: The Predictable Results of Subpoena Defiance
A short walk down memory lane shows how wrong former Trump campaign aide Sam Nunberg is about the consequences of defying a subpoena.

Outlook on International Cyber Norms: Three Avenues for Future Progress
“It’s high time to have a serious discussion about the international legal framework in which cyberwars take place,” UN Secretary General António Guterres said during his…