Cyber
357 Articles

No Place to Hide, No Place to Post: Lessons from Recent Efforts at “De-Platforming” ISIS
A recent scramble to reduce or eliminate the presence of ISIS in online platforms suggests that depriving the group of its virtual safe haven on any particular platform may be…

National Security at the United Nations This Week
Security Council members condemn US policy shift on Israeli settlements, a Russia-sponsored cyber agreement that could pave the way for more Internet censorship moves forward,…

Reassessing U.S. Cyber Operations Against Iran and the Use of Force
"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis
The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…

Contesting the Legality of Internet Shutdowns
As government communications shutdowns become more frequent, legal challenges citing international human rights law and domestic constitutional protections are also on the rise.…

An Overview of International Humanitarian Law in France’s New Cyber Document
France's positions explained - with translations of key text - on important issues like the meaning of "attack" and the application of the principles of distinction and proportionality…

France’s Major Statement on International Law and Cyber: An Assessment
Leading expert on international law and cyberspace assesses major new position staked out by French government.

Calling Off Iowa’s “Digital Caucuses” Is a Wise Display of Caution
DNC decision to block Iowa digital caucus deserves praise writes cybersecurity expert.

Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act
Recently, a federal judge in New York dismissed the Democratic National Committee’s (DNC) civil lawsuit against Russia, Wikileaks, and others stemming from the 2016 cyber-attack…

“Virtual Iowa Caucuses” Demand Cybersecurity Attention: 2020 Election Security Can’t Wait Till 2020
The past week featured stark reminders of the importance of election security as the 2020 presidential election swiftly approaches. First, former Special Counsel Robert Mueller…

Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II
Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…