Cyber
357 Articles

App Stores as Back-Doors for Government Regulation of End-to-End Encryption
App stores make natural chokepoints for de facto government regulation, without the long and politically expensive process of legislation. But the privacy and security implications…

Prepare for the Worst and Fight for the Best: A Citizen’s Guide to 2020 Electoral Interference
"Keeping in mind that one of the most effective ways to neutralize covert activity is to expose it, we hope that assessing Russia’s potential next moves will empower the electorate,…

Iran Joins Discussions of Sovereignty and Non-Intervention in Cyberspace
"This most recent statement by Iran’s General Staff appears to represent a rather sharp departure from the country’s previous position vis-à-vis the applicability of general…

The Second Oxford Statement on International Law Protections of the Healthcare Sector During Covid-19: Safeguarding Vaccine Research
International lawyers who wish to append their name to the Statement should send an email to ...

Canada’s Scattered and Uncoordinated Cyber Foreign Policy: A Call for Clarity
"Articulating Canada’s first principles in the context of cyberspace would help clarify what Canadian interests are, and what they mean, in a digitalized world. Only after defining…

Cyberattack Attribution and International Law
Earlier this week, the U.S. Department of Justice unsealed an indictment accusing two men linked to China’s Ministry of State Security of a decade-long campaign of hacking dissidents,…

A Deep Dive into Canada’s Overhaul of Its Foreign Intelligence and Cybersecurity Laws
Following the release of documents by Edward Snowden, many of the Western governments whose agencies’ activities were implicated in the leaks raced to update and modernize their…

Oxford Statement on the International Law Protections Against Cyber Operations Targeting the Health Care Sector
In advance of Friday, May 22 Arria-Formula meeting of the United Nations Security Council.

What the Pandemic Tells Us About the State of U.S. Cybersecurity
The Cyberspace Solarium Commission sees lessons on risk assessment, resilience, public-private collaboration, and more.

Zoom and the Problem of Cybersecurity Moral Hazard
When companies are insulated from paying the full costs associated with the use of their products, the problem of moral hazard can arise.

WhatsApp v. NSO Group: State Immunity and Cyber Spying
WhatsApp claims NSO implanted spyware on phones of human rights activists, lawyers, and religious figures. NSO says it can't be sued if it did so on behalf of (undisclosed) foreign…

Deepfakes 2.0: The New Era of “Truth Decay”
The first generation (Deepfakes 1.0) was largely used for entertainment purposes. The next generation (Deepfakes 2.0) is far more convincing and readily available.