Cyber

× Clear Filters
357 Articles
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part I

On June 11, 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded beyond countering election interference to…
A futuristic design of an integrated circuit with displays showing source code.

Empathy Matters: Leadership in Cyber

"Having both served in the U.S. Department of Defense in the post-9/11 era, we’ve found ourselves in far-flung outposts around the world, where Americans and Coalition partners…
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Cyberattack Attribution and the Virtues of Decentralization

In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched…
Maps showing US and Iranian reports of drone paths.

Top Expert Backgrounder: Aborted U.S. Strike, Cyber Operation Against Iran and International Law

"It is difficult to definitely conclude that the proposed U.S. kinetic strikes would have been valid exercises of self-defense."
High tension electrical power lines at a transfer station along Highway 58 are viewed on March 28, 2017, near Buttonwillow, California.

U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?

Emplacing malware in critical infrastructure on which the civilian population depends is a decision States must not take lightly. It may also violate international law, but 'responding…
Estonian President Kersti Kaljulaid speaks to open the Estonian parliament Riigikogu's first opening sitting after elections on April 4, 2019 in Tallinn.

Estonia Speaks Out on Key Rules for Cyberspace

Estonian President Kaljulaid stakes out a bold position on collective countermeasures in cyberspace and clarifies the obligation of due diligence.
Russian President Vladimir Putin looks at U.S. President Donald Trump during the welcoming ceremony prior to the G20 Summit's Plenary Meeting on November 30, 2018 in Buenos Aires, Argentina.

Countering Russia’s Malign Influence Operations

Putin’s successes with covert action show that such operations are not only more effective and cheaper than conventional military operations, but they have also resulted in far…
A Huawei logo is displayed at a retail store in Beijing on May 23, 2019.

An Emergency or Business as Usual? Huawei and Trump’s Emergency Powers

Should the emergency declaration be used purely as leverage in a trade war, it would clearly be an abuse of the intent of emergency powers.
Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard engage in weekend training at Warfield Air National Guard Base, Middle River, Md., Jun. 3, 2017. They sit at semicircle of computers.

When To Use the ‘Nuclear Option?’ Why Knocking Russia Offline Is a Bad Idea

The news about the November 2018 Cyber Command operation that knocked the notorious Russian troll farm, the Internet Research Agency, offline before the U.S. midterm elections…
A person types on a laptop. Translucent icons litter the image to represent cybersecurity.

CTRL+HALT+Defeat: State-Sponsored Surveillance and the Suppression of Dissent

A new lawsuit in Israeli court seeks accountability for the export of malicious spyware used for digital surveillance of human rights defenders, journalists, and political dissidents.…
Canadian flags line the walkway in front of the Parliament in Ottawa, Ontario, October 2, 2017.

Canada Considers Most Far-Reaching Intell Reforms in Decades

The proposed bill strikes a healthy balance between facing up to new cyber-threats and ensuring accountability and oversight.
Activists Luis Nolasco, Aki Rose and Josh Rabb hold placards reading "Secure Phones Saves Lives" while gathered in front of the US District Court in Riverside, California, on March 22, 2016, where the Apple v FBI trial was due to take place before its sudden postponement. A television monitor displays the messages of some 20,000 people who have signed an online petition agreeing to oppose the FBI order.

Split Over Compelled Decryption Deepens With Massachusetts Case

Encryption is as omnipresent as computers, tablets, and smartphones. Yet the Supreme Court has not provided guidance on the constitutional implications of compelling a suspect…
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: