Cyber
357 Articles

White House Cybersecurity Bill: Botnets and “Creative Lawyering”
The White House has released its new legislative proposals on cybersecurity information sharing, federal data breach notification, and amendments to cyber-related law enforcement…

Text of FBI Director’s Remarks: New Details on Why “Entire Intelligence Community” has “Very High Confidence” North Korea Hacked Sony
At the International Conference on Cyber Security held at Fordham University on Wednesday, FBI Director James Comey revealed new details about why the FBI and “the entire intelligence…

The State of Humanitarian Law in Cyber Conflict
During the recent Sony incident, politicians and pundits debated whether the cyber operations allegedly launched by North Korea were an “act of war.” Presumably, they were…

Normative Voids and Asymmetry in Cyberspace
[Editors’ Note: This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous…

The Sony Hack: Norms and North Korea
In statements on the Sony hack on Friday, both Secretary of State John Kerry and President Obama highlighted the need to develop norms for state behavior in cyberspace. Tying the…

International Law and Cyber Attacks: Sony v. North Korea
It could only happen in the movies. A major Hollywood company produces a film starring well-known comedic actors which involves the tongue-in-cheek assassination of the leader…

Cyber Attribution Problems—Not Just Who, but What
Yesterday, Bloomberg News reported that hackers, likely from Russia, caused a 2008 explosion on the Baku-Tbilisi-Ceyhan (BTC) oil pipeline in Turkey. According to Bloomberg, the…

The US Needs a New International Strategy for Cyberspace
Editors’ Note: The following post is the latest installment of our weekly feature, “Monday Reflections,” in which a different Just Security editor will take an in-depth…

Takeaways from the House Intelligence Committee Cybersecurity Hearing
On Thursday morning, the House Permanent Select Committee on Intelligence held a hearing on “Cybersecurity Threats: The Way Forward,” featuring testimony by Adm. Michael Rogers,…

The Private Frontline in Cybersecurity Offense and Defense
Two reports released Tuesday highlight the important role private actors are playing in cybersecurity defense. Cybersecurity company FireEye released a report on espionage activities…

International Agreements—and Disagreements—on Cybersecurity
Russian media report here and here that Russia and China are preparing to sign a cybersecurity treaty when Vladimir Putin visits China on November 10. The reported agreement would…

Bugs, Bounties, and Blowback
Last week news broke of a major software bug—now termed “Shellshock”—in open-source software used in Linux and UNIX operating systems. Security experts have warned that…