Cyber
357 Articles

So, You Want to Do Something About Russian Election Interference?
If this White House were actually serious about tackling foreign interference in our elections, what would it do?

Putin Had a Win-Win Strategy for Life Post-2016; Trump, Not So Much
Putin didn't just count on Clinton losing. He also counted on her winning. Three former U.S. Intelligence Community officials analyze Putin's likely strategic thinking in 2016…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks
Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.
We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Locking in Transparency on the Vulnerabilities Equities Process
Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…

Cybersecurity and the 2020 Census: Are We Prepared?
A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

Six Big Takeaways from Mueller’s Indictment of Russian Intel Officers
One of the biggest takeaways from Mueller's indictment? WikiLeaks appears to have been deeply involved in a Russian intelligence operation.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation
A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

Protecting Civilians in Cyberspace: Ideas for the Road Ahead
Distinctions between offline and online conflicts are blurring as tools and tactics deployed in cyberspace trigger real world consequences. In Mexico, for example, commercial spyware…

The Technicolor Zone of Cyberspace, Part 2
What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?

The Technicolor Zone of Cyberspace – Part I
Two leading experts on cyber law analyze the U.K. Attorney General's major speech on international law and cyber, delivered at Chatham House last month.

A Model for Improving Cooperation in Cyber – the Highway Safety Act?
A new piece of bipartisan legislation—the “Enhancing Grid Security through Public-Private Partnerships Act” (HR 5240)—was reported out of the House Energy and Commerce…