Cyber
361 Articles
Deterrence by Indictment?
In an indictment released this morning, the Justice Department charged seven Iranians with carrying out distributed denial of service (DDoS) attacks on US financial institutions…
Security and the Internet of Things
On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…
“Your Account May Have Been Targeted by State-Sponsored Actors”: Attribution and Evidence of State-Sponsored Cyberattacks
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Was the Cyber Attack on a Dam in New York an Armed Attack?
Concerns about the vulnerability of infrastructure to cyber attacks were highlighted in two recent news articles. Last month, the Wall Street Journal reported that in 2013, Iranian…
OmniCISA Pits DHS Against the FCC and FTC on User Privacy
On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would…
The FBI Should Stop Undermining Norms Before They Take Root
Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
International Law and the UN GGE Report on Information Security
The international community recently took an important step toward establishing global norms of behavior in cyberspace with the publication of the UN’s outcome report from its…
Challenges New Weapons and Humanitarian Assistance Present for International Law
Editor’s Note: This is the fourth post in a miniseries about the International Committee of the Red Cross’s newly released Report on International Humanitarian Law and the…
Is the FBI Using Zero-Days in Criminal Investigations?
We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web.…
Too Much Posturing and Not Enough Substance on Encryption
Obama administration officials revealed late last week that will not force technology firms to weaken digital encryption to give government greater access to user data. This is…
The US-China Cyber Agreement: What’s In and What’s Out
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Does CISA Contain a Surveillance Law XSS Attack?
Skeptical concerns about the proposed Cybersecurity Information Sharing Act have, thus far, tended to fall into two main categories: Doubts about efficacy—most actual practitioners…