Cyberattacks

× Clear Filters
72 Articles
A North Korean national flag on a tall metal structure waving high above all other buildings in Gijungdong as seen from an observation post on September 28, 2017 in Panmunjom, South Korea.

Cyber, Sovereignty, and North Korea–And the Risk of Inaction

Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…

Abandoning Iranian Nuclear Deal Could Lead to New Wave of Cyberattacks

Over the last two years, U.S. banks and government agencies have enjoyed a notable respite from malicious Iranian cyber activity. The timing of this drop-off happens to coincide…
Locks on $100 bill with an internet browser overlaid.

Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?

Identifying the legal norms that apply in cyberspace remains highly challenging. The recent collapse of the 5th UN Group of Governmental Experts (GGE) on Developments in the Field…

As Hackers Target U.S. Voting Machines, We Need Leaders Who’ll Put Country Over Party

“If there has ever been a clarion call for vigilance and action against a threat to the very foundation of our democratic political system, this episode is it,” former…
A map titled, “Tainted Leaks: Targets Linked to 39 Countries” published by Citizen Lab 2017 shows 10 countries highlighted in pink indicating the “top 10 countries of Targeting in the phishing campaign.” 1. Ukraine 22%; 2. Russia 11%; 3. Turkey 7%; 4. Kyrgyzstan 7%; 5. Georgia 6%; 6. USA 5%; 7. Kazakhstan 4%; 8. Mongolia 3%; 9. Armenia 3%; 10. Uzbekistan 3%

Q & A With Citizen Lab on “Tainted Leaks” and Russia’s Disinformation Campaign

On Thursday, the University of Toronto’s Citizen Lab published evidence of a dangerous new twist in the war against truth. Russia-linked hackers, dubbed CyberBerkut, have…

Will Election Hacking Split NATO?

NATO’s Deputy Supreme Allied Commander Europe, General Sir Adrian Bradshaw, has reportedly suggested that NATO may consider Russian interference in upcoming European elections…
: A laptop computer displays a message as U.S. Army General Dan McNeill, Coalition Joint Task Force (CJTF) 180 commander, speaks to the news media inside the recently constructed CJTF-180 Joint Operations Center May 29, 2002 at Bagram airbase in Afghanistan.

Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law?

It is already widely acknowledged that cyberspace has become the fifth domain of warfare, and militaries around the world are training various cyber units, who will be supporting…
Just Security

Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t

This week marked the release of Tallinn Manual 2.0 on the International Law of Cyber Operations, the result of the follow-on project that led to the publication of the Tallinn…
Two hands type on a keyboard. The screen shows blue lettering on a dark background.

Watch the Tallinn Manual 2.0 Launch Discussion Online

Today marks the launch of Tallinn Manual 2.0, a key text on how existing international law applies to cyber operations. It was authored by 19 international law experts, and Just…
A keyboard.

The “Hacked” US Election: Is International Law Silent, Faced with the Clatter of Cyrillic Keyboards?

Russia, it would appear, “hacked” its way into the US election. The Obama administration has pledged some sort of response. That reaction should be guided by a close consideration…

International Law and Proposed U.S. Responses to the D.N.C. Hack

In a short essay in Foreign Policy, retired Admiral James Stavridis addresses recent election season cyber operations against the Democratic National Party that the U.S. has attributed…
Just Security

Deterrence by Indictment?

In an indictment released this morning, the Justice Department charged seven Iranians with carrying out distributed denial of service (DDoS) attacks on US financial institutions…
1-12 of 72 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: