Cyber

× Clear Filters
357 Articles
Just Security

OmniCISA Pits DHS Against the FCC and FTC on User Privacy

On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would…
Just Security

The FBI Should Stop Undermining Norms Before They Take Root

Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
Just Security

International Law and the UN GGE Report on Information Security

The international community recently took an important step toward establishing global norms of behavior in cyberspace with the publication of the UN’s outcome report from its…
Just Security

Challenges New Weapons and Humanitarian Assistance Present for International Law

Editor’s Note: This is the fourth post in a miniseries about the International Committee of the Red Cross’s newly released Report on International Humanitarian Law and the…
Just Security

Is the FBI Using Zero-Days in Criminal Investigations?

We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web.…
Just Security

Too Much Posturing and Not Enough Substance on Encryption

Obama administration officials revealed late last week that will not force technology firms to weaken digital encryption to give government greater access to user data. This is…
Just Security

The US-China Cyber Agreement: What’s In and What’s Out

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Does CISA Contain a Surveillance Law XSS Attack?

Skeptical concerns about the proposed Cybersecurity Information Sharing Act have, thus far, tended to fall into two main categories: Doubts about efficacy—most actual practitioners…
Just Security

The Dream of Internet Freedom Doesn’t Have to Die

This post is a version of the introduction to the author’s keynote speech, “The Lifecycle of a Revolution” at this year’s Black Hat information security conference. Twenty…
Just Security

Legislative Cyber Threats: CISA’s Not The Only One

If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal…
Just Security

Cyber Conflict in DOD’s Law of War Manual

Editor’s Note: Just Security is holding a “mini forum” on the new Defense Department Law of War Manual. This series includes posts from Sean Watts, Eric Jensen, Adil Ahmad…
Just Security

“International Cyber Stability” and the UN Group of Governmental Experts

In recent months, the United States has been pushing a new policy of “international cyber stability.” In a speech in Seoul in May, Secretary of State John Kerry explained that…
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: