Cyber

× Clear Filters
357 Articles
Social Media Apps on a Phone: Twitter, Messenger, telegram, Google+, Gmail, Instagram, and Snapchat

No Place to Hide, No Place to Post: Lessons from Recent Efforts at “De-Platforming” ISIS

A recent scramble to reduce or eliminate the presence of ISIS in online platforms suggests that depriving the group of its virtual safe haven on any particular platform may be…
Germany's deputy permanent representative to the UN Jürgen Schulz, France's permanent representative to the UN, Nicolas de Rivière, Britain's permanent representative to the UN, Karen Pierce, Poland's permanent representative to the UN, Joanna Wronecka, and Belgium's permanent representative to the UN, Marc Pecsteen speak to the press at the United Nations Headquarters in New York on November 20, 2019 about the security situation in Israel prior to a Security Council meeting on the "situation in the Middle East, including the Palestinian question."

National Security at the United Nations This Week

Security Council members condemn US policy shift on Israeli settlements, a Russia-sponsored cyber agreement that could pave the way for more Internet censorship moves forward,…
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland.

Reassessing U.S. Cyber Operations Against Iran and the Use of Force

"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."
The Netherlands' Minister of Foreign Affairs Stef Blok speaks during a debate about Socialist Party (SP) party chairman Murat Memis at the Senate, in The Hague, on December 26, 2019.

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis

The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…
A mobile browser unable to connect to Facebook.

Contesting the Legality of Internet Shutdowns

As government communications shutdowns become more frequent, legal challenges citing international human rights law and domestic constitutional protections are also on the rise.…
Binary code lit up in blue lights

An Overview of International Humanitarian Law in France’s New Cyber Document

France's positions explained - with translations of key text - on important issues like the meaning of "attack" and the application of the principles of distinction and proportionality…
A map of France with binary computer code.

France’s Major Statement on International Law and Cyber: An Assessment

Leading expert on international law and cyberspace assesses major new position staked out by French government.
Rally attendees cast shadows as they hold campaign signs during a rally held by 2020 Democratic Presidential hopeful Senator Kamala Harris (D-CA) in Davenport, Iowa on August 12, 2019.

Calling Off Iowa’s “Digital Caucuses” Is a Wise Display of Caution

DNC decision to block Iowa digital caucus deserves praise writes cybersecurity expert.
A picture taken on October 17, 2016 shows an employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow.

Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act

Recently, a federal judge in New York dismissed the Democratic National Committee’s (DNC) civil lawsuit against Russia, Wikileaks, and others stemming from the 2016 cyber-attack…
Just Security

“Virtual Iowa Caucuses” Demand Cybersecurity Attention: 2020 Election Security Can’t Wait Till 2020

The past week featured stark reminders of the importance of election security as the 2020 presidential election swiftly approaches. First, former Special Counsel Robert Mueller…
A participant attends the 34C3 Chaos Communication Congress of the Chaos Computer Club on December 27, 2017 in Leipzig, Germany.

Why the Ghost Keys ‘Solution’ to Encryption is No Solution

The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II

Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: