Cyberattacks

× Clear Filters
72 Articles
Binary code in blue on a blue and black background

The Defense Department’s Measured Take on International Law in Cyberspace

A close reading of the Defense Department's statement on cyber by top expert, comparing it to positions of Australia, France, Netherlands, United Kingdom and others.
World Map

The Application of International Law to Cyberspace: Sovereignty and Non-intervention

A new Chatham House Report discusses how key international law principles apply to States’ cyber operations below the threshold of use of force and makes recommendations to governments…
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland.

Reassessing U.S. Cyber Operations Against Iran and the Use of Force

"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."
The Netherlands' Minister of Foreign Affairs Stef Blok speaks during a debate about Socialist Party (SP) party chairman Murat Memis at the Senate, in The Hague, on December 26, 2019.

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis

The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…
Binary code lit up in blue lights

An Overview of International Humanitarian Law in France’s New Cyber Document

France's positions explained - with translations of key text - on important issues like the meaning of "attack" and the application of the principles of distinction and proportionality…
A map of France with binary computer code.

France’s Major Statement on International Law and Cyber: An Assessment

Leading expert on international law and cyberspace assesses major new position staked out by French government.
A picture taken on October 17, 2016 shows an employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow.

Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act

Recently, a federal judge in New York dismissed the Democratic National Committee’s (DNC) civil lawsuit against Russia, Wikileaks, and others stemming from the 2016 cyber-attack…
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Cyberattack Attribution and the Virtues of Decentralization

In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched…
Maps showing US and Iranian reports of drone paths.

Top Expert Backgrounder: Aborted U.S. Strike, Cyber Operation Against Iran and International Law

"It is difficult to definitely conclude that the proposed U.S. kinetic strikes would have been valid exercises of self-defense."
Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard engage in weekend training at Warfield Air National Guard Base, Middle River, Md., Jun. 3, 2017. They sit at semicircle of computers.

When To Use the ‘Nuclear Option?’ Why Knocking Russia Offline Is a Bad Idea

The news about the November 2018 Cyber Command operation that knocked the notorious Russian troll farm, the Internet Research Agency, offline before the U.S. midterm elections…
One hundred cardboard cutouts of Facebook founder and CEO Mark Zuckerberg stand outside the US Capitol in Washington, DC, April 10, 2018. The cardboard cutouts wear shirts that read, "fix fakebook."

Can American Political Candidates Help Stop the Flood of Disinformation with a Pledge?

U.S. intelligence officials are already issuing warnings about foreign interference in American democracy ahead of what promises to be a bruising 2020 election cycle. Delivering…
A Luas tram heads for Dublin on December 2, 2010 near Cherrywood - south of Dublin, Ireland.

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking

Imagine hackers commandeered a capital city’s transit system, holding it hostage for a cryptocurrency ransom. Consider the implications of this attack: beyond a data breach,…
1-12 of 72 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: