This Giving Tuesday, you can help us inform a more just and secure world. Donate now.

AI & Emerging Technology

Cyber

× Clear Filters
456 Articles

International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms

On June 23, after years of slow yet meaningful progress in developing State consensus regarding the application of international law norms to cyberspace, the UN Group of Governmental…

Political Parties as Critical Infrastructure?

Former Secretary of Homeland Security Jeh Johnson testified Wednesday before the House Intelligence Committee as part of the House investigation into Russian interference in the…
A map titled, “Tainted Leaks: Targets Linked to 39 Countries” published by Citizen Lab 2017 shows 10 countries highlighted in pink indicating the “top 10 countries of Targeting in the phishing campaign.” 1. Ukraine 22%; 2. Russia 11%; 3. Turkey 7%; 4. Kyrgyzstan 7%; 5. Georgia 6%; 6. USA 5%; 7. Kazakhstan 4%; 8. Mongolia 3%; 9. Armenia 3%; 10. Uzbekistan 3%

Q & A With Citizen Lab on “Tainted Leaks” and Russia’s Disinformation Campaign

On Thursday, the University of Toronto’s Citizen Lab published evidence of a dangerous new twist in the war against truth. Russia-linked hackers, dubbed CyberBerkut, have…
A website address bar with a secure lock icon.

The Trump Administration’s Early (Appropriate) Focus on Botnets

President Donald Trump’s Executive Order on Cybersecurity, concentrating as it does on things largely within the authority of the executive branch, is a reasonable early approach…
Just Security

National Security-Related Congressional Hearings, May 8-May 12

Monday, May 8 2:30pm – Senate Judiciary Committee – Russian Interference in the 2016 United States Election (here) Tuesday, May 9 9:30am – Senate Committee on Armed Services…
U.S. Homeland Security Secretary John Kelly delivers his first public remarks since being appointed by President Donald Trump at the Jack Morton Auditorium on the campus of The George Washington University April 18, 2017 in Washington, DC.

The Trump Administration’s Homeland Security Record – and What Lies Ahead

It has been an eventful first 100 days for the Trump team in the realm of homeland security. In his first full week in office, the president made a major splash by issuing three…

Will Election Hacking Split NATO?

NATO’s Deputy Supreme Allied Commander Europe, General Sir Adrian Bradshaw, has reportedly suggested that NATO may consider Russian interference in upcoming European elections…
Military personnel crowd around a laptop.

Why a Broad Definition of “Violence” in Cyber Conflict is Unwise and Legally Unsound

International Humanitarian Law (IHL, aka the Law of Armed Conflict) is not intended to outlaw conflict.  It is meant to regulate conflict in order to reduce its impact on civilians…
: A laptop computer displays a message as U.S. Army General Dan McNeill, Coalition Joint Task Force (CJTF) 180 commander, speaks to the news media inside the recently constructed CJTF-180 Joint Operations Center May 29, 2002 at Bagram airbase in Afghanistan.

Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law?

It is already widely acknowledged that cyberspace has become the fifth domain of warfare, and militaries around the world are training various cyber units, who will be supporting…

Tallinn Manual 2.0 – Advancing the Conversation

On Wednesday last week I had the privilege of attending the Washington, D.C. launch of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations at the Atlantic…
Just Security

Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t

This week marked the release of Tallinn Manual 2.0 on the International Law of Cyber Operations, the result of the follow-on project that led to the publication of the Tallinn…
Two hands type on a keyboard. The screen shows blue lettering on a dark background.

Watch the Tallinn Manual 2.0 Launch Discussion Online

Today marks the launch of Tallinn Manual 2.0, a key text on how existing international law applies to cyber operations. It was authored by 19 international law experts, and Just…
1-12 of 456 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: