Cyber
357 Articles

Hack-to-Patch by Law Enforcement Is a Dangerous Practice
Recent so-called hack-to-patch activity by law enforcement sets a dangerous precedent for the global business community. Serious security, technical, and policy drawbacks emerge…

SolarWinds: Accountability, Attribution, and Advancing the Ball
Assessing the United States' actions on SolarWinds and what it means for global responses to malicious cyber activities in future.

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack
In a recent operation, the FBI removed malware from hacked Microsoft Exchange servers, and only attempted to notify the servers’ owners after the fact. This approach is almost…

Limited Sanctions Will Not Deter Putin, But They Are a Fine Start
All this disclosure is arguably the best way for democracies to use true information to fight back against manipulative active measures

China’s Dystopian “New IP” Plan Shows Need for Renewed US Commitment to Internet Governance
The US must rally partners to rein in the abuse of multilateral institutions for Huawei’s plans on 6G and beyond, which make concerns over 5G look minor.

One Thousand and One Talents: The Race for A.I. Dominance
Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…

The Digital Technology Agenda at the Summit for Democracy
"To combat the digital authoritarian threat, democracies must be rallied around a shared values-based vision of digital society and a joint strategic technology agenda."

Germany’s Positions on International Law in Cyberspace Part II
Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.

Germany’s Positions on International Law in Cyberspace Part I
Germany issues major statement on cyberspace and international law, analyzed here by leading expert Professor Michael Schmitt.

China’s Military Tech Ambitions – What’s the U.S.- EU Gameplan?
The US and EU have taken divergent approaches to Chinese tech advances - including military and dual-use tech. To maintain their alliance, they must synchronize their approach.…

Protecting the Information Space in Times of Armed Conflict
What, if any, limits exist concerning digital information operations in armed conflict? Does the humanitarian legal framework adequately capture the protection needs that arise…

The Latest North Korea Cyber Indictment Should Serve as a Model
Last week, the Biden administration’s Department of Justice (DOJ) announced its first major cyber-related indictment. An investigation long in the works, the indictment charges…