Cyber
359 Articles

Russia “Previewed” Plan to Disseminate Emails with Trump Campaign
Goodman analyzes Schiff’s revelation that Russia gave preview to Trump campaign that the Kremlin could help disseminate stolen emails. Then he addresses the legally important…

Microsoft, Ireland, and the Rest of the World
United States v. Microsoft will be practically significant for its effect on law enforcement’s ability to access data stored abroad, and it has the potential to be doctrinally…

A Checklist for Protecting Our Elections from Foreign Meddling
Vice President and General Counsel for Facebook Colin Stretch, General Counsel for Twitter Sean Edgett, and Senior Vice President and General Counsel for Google Kent Walker at…

WannaCry and the International Law of Cyberspace
Immediately following this May’s “WannaCry” ransomware cyber-attacks, the United Kingdom’s National Cyber Security Centre (NCSC) speculated that the hacker group “Lazarus”—believed…

Three Questions on the WannaCry Attribution to North Korea
President Donald Trump speaks alongside Secretary of State Rex Tillerson during a cabinet meeting at the White House on November 20, 2017, at which Trump officially designated…

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act
For years now, there has been a discussion surrounding the feasibility of active cyber defense, and allowing private entities or individuals to “hack back” against hostile…

The USA Liberty Act — aka Don’t Let the Constitutional be the Enemy of the Unconstitutional
The House Judiciary Committee has completed its markup of a major surveillance reform bill intended to better protect Americans’ privacy and enhance transparency. Responding…

What the White House Needs to Disclose about its Process for Revealing Cybersecurity Vulnerabilities
At a series of events earlier in October, White House Cybersecurity Coordinator Rob Joyce announced that he is preparing to release more information about the Vulnerabilities Equities…

Cyber, Sovereignty, and North Korea–And the Risk of Inaction
Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…

Would the United States Be Responsible for Private Hacking?
Rep. Tom Graves (R-GA) and Rep. Kyrsten Sinema (D-AZ) introduced the Active Cyber Defense Certainty Act (H.R. 4036) in the House of Representatives on Oct. 13. The bill would amend…

It’s Time to Pass Legislation Governing a Key Part of the Government’s Hacking Policy
An example of the splash screen from the Petya malware that was suspected of relying on an exploit developed by the U.S. National Security Agency. It’s well known that government…

Abandoning Iranian Nuclear Deal Could Lead to New Wave of Cyberattacks
Over the last two years, U.S. banks and government agencies have enjoyed a notable respite from malicious Iranian cyber activity. The timing of this drop-off happens to coincide…