Cyber
359 Articles
Recommended Reading: Kristen Eichensehr on Classifying the Election System as “Critical Infrastructure” in Response to Russian Hacks
Several news outlets are reporting that the Obama Administration is likely to announce very shortly a packet of measures it will pursue in response to Russian cyber activities…

The “Hacked” US Election: Is International Law Silent, Faced with the Clatter of Cyrillic Keyboards?
Russia, it would appear, “hacked” its way into the US election. The Obama administration has pledged some sort of response. That reaction should be guided by a close consideration…

A Patriot Fears Not Truth about Russian Election Interference: Time for a commission to investigate
Last week, the Washington Post reported that the Central Intelligence Agency briefed Senators that it is “clear” that Russian hacking operations were designed to help Donald…
The Economic Incentives for International Cybersecurity Coordination
On Friday, the President’s Commission on Enhancing National Cybersecurity published its final report, making 16 recommendations and identifying 53 action items to improve cybersecurity…

KT McFarland’s Hardline on Russia with Nuance
On Friday, the President-elect named KT McFarland as Deputy National Security Advisor, a position that does not require Senate confirmation. In contrast with positions articulated…
US Transparency Regarding International Law in Cyberspace
Last Thursday, State Department Legal Adviser Brian Egan, delivered an important speech at Berkeley Law School on the relationship between international law and cyber activities. …
National Security-Related Congressional Hearings, November 14–18
Tuesday, November 15 10:30am – House Committee on Oversight and Government Reform – Oversight of the Secret Service (here) Wednesday, November 16 10:00am – House Committee…
State Department’s Chief Legal Adviser Rebukes (Trump’s) Proposed Closures of the Internet
The U.S. government should not consider shutting down parts of the Web as it continues to develop ways to prevent the Internet from being used for terrorist purposes, a top State…

International Law and Proposed U.S. Responses to the D.N.C. Hack
In a short essay in Foreign Policy, retired Admiral James Stavridis addresses recent election season cyber operations against the Democratic National Party that the U.S. has attributed…
A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate
In my recent Just Security piece, I argued that Aitel and Tait’s suggestions in Lawfare to focus the Vulnerability Equities Process (VEP) more narrowly on strategic intelligence…
The Vulnerability Equities Process Should Consider More than Intelligence Community Needs
Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…
A 9/11 Commission Approach to the Russian Hack of the DNC
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…