AI & Emerging Technology
Cyber
458 Articles
Towards a Cyber-Security Treaty
The Democratic National Convention (DNC) leaks revealed last week have presumably reminded many Americans to the severe cyber-threats this country is facing. Particularly alarming…
The DNC Hack and Democracy
Last Tuesday, Jack Goldsmith published a remarkable series of tweets about the apparent Russian hack and publication of confidential DNC emails on the eve of the Democratic…
The Democratic National Committee Hack: Information as Interference
Earlier this month, WikiLeaks released nearly 20,000 e-mails belonging to Democratic National Committee’s top officials, where Senator Bernie Sanders was humiliated and criticized.…
Whose World Is This?: US and UK Government Hacking
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules…
The Early Edition: June 21, 2016
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Just what has…
Recap of Recent Posts on Just Security (June 11–17)
I. The Brexit Vote Shaheed Fatima QC, Brexit and National Security (Monday, June 13) II. Cybersecurity Ido Kilovaty, Guest Post: Will “Cyber Bonds” Mitigate Transnational…
Will “Cyber Bonds” Mitigate Transnational Cyberspace Threats?
Last week, Nathan Bruschi introduced the new concept of “cyber bonds,” which seeks to deter governments from engaging in harmful transnational cyberspace activities by hurting…
Recap of Recent Posts on Just Security (June 4–10)
I. Cybersecurity Kristen Eichensehr, Giving Up on Cybersecurity — Strategically (Monday, June 6) II. Surveillance & Intelligence Jennifer Daskal, Beware of the Emergency…
Giving Up on Cybersecurity — Strategically
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away
Electronic surveillance succeeds because it is secret. When the government seeks to record “what is whispered in the closet,” in the words of Justice Brandeis, it must use…
Deterrence by Indictment?
In an indictment released this morning, the Justice Department charged seven Iranians with carrying out distributed denial of service (DDoS) attacks on US financial institutions…
Security and the Internet of Things
On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…