Cybersecurity
237 Articles

Punching on the Edges of the Grey Zone: Iranian Cyber Threats and State Cyber Responses
Retired Colonel Gary Corn, a former senior JAG at U.S. Cyber Command, discusses broader legal international norms to counter Iran and other states’ malicious cyber activities.…

National Security at the United Nations This Past Week
Editor’s Note: This is the latest in Just Security’s weekly series keeping readers up to date on developments at the United Nations at the intersection of national security,…

No Place to Hide, No Place to Post: Lessons from Recent Efforts at “De-Platforming” ISIS
A recent scramble to reduce or eliminate the presence of ISIS in online platforms suggests that depriving the group of its virtual safe haven on any particular platform may be…

Reassessing U.S. Cyber Operations Against Iran and the Use of Force
"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis
The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…

France’s Major Statement on International Law and Cyber: An Assessment
Leading expert on international law and cyberspace assesses major new position staked out by French government.

Calling Off Iowa’s “Digital Caucuses” Is a Wise Display of Caution
DNC decision to block Iowa digital caucus deserves praise writes cybersecurity expert.

“Virtual Iowa Caucuses” Demand Cybersecurity Attention: 2020 Election Security Can’t Wait Till 2020
The past week featured stark reminders of the importance of election security as the 2020 presidential election swiftly approaches. First, former Special Counsel Robert Mueller…

Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…

Empathy Matters: Leadership in Cyber
"Having both served in the U.S. Department of Defense in the post-9/11 era, we’ve found ourselves in far-flung outposts around the world, where Americans and Coalition partners…

Top Expert Backgrounder: Aborted U.S. Strike, Cyber Operation Against Iran and International Law
"It is difficult to definitely conclude that the proposed U.S. kinetic strikes would have been valid exercises of self-defense."

U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?
Emplacing malware in critical infrastructure on which the civilian population depends is a decision States must not take lightly. It may also violate international law, but 'responding…