Cyber Warfare

× Clear Filters
55 Articles

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls

A Russian troll sits down at his desktop and logs into one of the social media accounts he uses to impersonate and radicalize Americans. Suddenly, a direct message appears: “Hello,…
Text reading, “Scan Result: Virus W32.Sircam.Worm@mm found. File Not cleaned. This file contains a computer worm, a program that spreads very quickly over the Intent to many computers and can delete files, steal sensitive information, or render your machine unusable. This attachment has a virus that may infect your computer. It cannot be cleaned. We recommend that you Do Not download this attachment.”

Planning for ‘Cyber Fallout’ After the Iranian Nuclear Deal

Keep your cyber tools close, your history books closer. For some, the signing of the July 2015 Iran nuclear deal might appear as a “watershed moment” for abating the…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks

Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…
A Boeing 737 MAX 7 taxis before its first flight at Renton Municipal Airport, on March 16, 2018 in Renton, Washington.

All Hands on Deck: Cyber Attacks Against Private Companies and International Law

Last Wednesday, reports surfaced that the U.S. aircraft manufacturer Boeing had been hit by a serious ransomware attack. A leaked internal memo suggested that some production equipment…

Cyber Operations and the U.S. Definition of “Armed Attack”

[Ed. Note: Based on Goodman's remarks at U.S. Cyber Command’s Annual Legal Conference.]

A widely accepted view of the UN Charter is that a State can use force…

Outlook on International Cyber Norms: Three Avenues for Future Progress

“It’s high time to have a serious discussion about the international legal framework in which cyberwars take place,” UN Secretary General António Guterres said during his…

A Checklist for Protecting Our Elections from Foreign Meddling

Vice President and General Counsel for Facebook Colin Stretch, General Counsel for Twitter Sean Edgett, and Senior Vice President and General Counsel for Google Kent Walker at…
A North Korean national flag on a tall metal structure waving high above all other buildings in Gijungdong as seen from an observation post on September 28, 2017 in Panmunjom, South Korea.

Cyber, Sovereignty, and North Korea–And the Risk of Inaction

Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…
Locks on $100 bill with an internet browser overlaid.

Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?

Identifying the legal norms that apply in cyberspace remains highly challenging. The recent collapse of the 5th UN Group of Governmental Experts (GGE) on Developments in the Field…

International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms

On June 23, after years of slow yet meaningful progress in developing State consensus regarding the application of international law norms to cyberspace, the UN Group of Governmental…
Military personnel crowd around a laptop.

Why a Broad Definition of “Violence” in Cyber Conflict is Unwise and Legally Unsound

International Humanitarian Law (IHL, aka the Law of Armed Conflict) is not intended to outlaw conflict.  It is meant to regulate conflict in order to reduce its impact on civilians…
: A laptop computer displays a message as U.S. Army General Dan McNeill, Coalition Joint Task Force (CJTF) 180 commander, speaks to the news media inside the recently constructed CJTF-180 Joint Operations Center May 29, 2002 at Bagram airbase in Afghanistan.

Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law?

It is already widely acknowledged that cyberspace has become the fifth domain of warfare, and militaries around the world are training various cyber units, who will be supporting…
1-12 of 55 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: