Cyberattacks
72 Articles

Digital Tech Companies in War: What is the Law? What are the Risks?
Tech companies need to be familiar with IHL to protect their employees, properties, and surrounding civilians during armed conflict.

Bugs in the Software Liability Debate
In the debate over software liability, a negligence standard requires research and must not lean only on avoiding "known vulnerabilities."

The Year of Section 702 Reform, Part I: Backdoor Searches
Requiring a warrant for U.S. person queries honors the balance between security and liberty struck in the Fourth Amendment and ensures that Section 702 can’t be used to get around…

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures
Poland's positions push the discussion forward on contested areas of law.

Regulating Artificial Intelligence Requires Balancing Rights, Innovation
"The United States should do what it has done for generations now when it comes to innovative thought and be a world leader ensuring AI supports society by providing the most benefits…

AcidRain Malware and Viasat Network Downtime in Ukraine: Assessing the Cyber War Threat
Russia's disruption of the Viasat network in Ukraine should be a wakeup call for policymakers.

Empowering Security Researchers Will Improve Global Cybersecurity
China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Expert Backgrounder: NATO Response Options to Potential Russia Cyber Attacks
Top cyber law expert explains NATO member states' legal options in event of different forms of Russian cyber attacks in wake of Ukraine invasion.

On Ransomware, Cyber Command Should Take a Backseat
As concerns about ransomware grow, U.S. policymakers must resist temptations to over-militarize the U.S. response, instead developing cyber capabilities across a range of federal…

International Law’s Role in Combating Ransomware?
International law has an important role to play in cyberspace, but with regard to the ostensible rules of sovereignty and cyber due diligence, the United States should continue…

Three International Law Rules for Responding Effectively to Hostile Cyber Operations
Express endorsement of three legal policy positions would go far in ensuring the door to effective cyber responses is open.

Four Key Takeaways from the Senate’s Cybersecurity Confirmation Hearing
There were approximately 65,000 ransomware attacks last year in the United States, and that number doesn’t seem to be slowing down. Over the past few weeks, cybersecurity has…