Cybersecurity
237 Articles

Will “Cyber Bonds” Mitigate Transnational Cyberspace Threats?
Last week, Nathan Bruschi introduced the new concept of “cyber bonds,” which seeks to deter governments from engaging in harmful transnational cyberspace activities by hurting…

Recap of Recent Posts on Just Security (June 4–10)
I. Cybersecurity Kristen Eichensehr, Giving Up on Cybersecurity — Strategically (Monday, June 6) II. Surveillance & Intelligence Jennifer Daskal, Beware of the Emergency…

Giving Up on Cybersecurity — Strategically
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Deterrence by Indictment?
In an indictment released this morning, the Justice Department charged seven Iranians with carrying out distributed denial of service (DDoS) attacks on US financial institutions…

Security and the Internet of Things
On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…

“Your Account May Have Been Targeted by State-Sponsored Actors”: Attribution and Evidence of State-Sponsored Cyberattacks
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

OmniCISA Pits DHS Against the FCC and FTC on User Privacy
On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would…

The FBI Should Stop Undermining Norms Before They Take Root
Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…

International Law and the UN GGE Report on Information Security
The international community recently took an important step toward establishing global norms of behavior in cyberspace with the publication of the UN’s outcome report from its…

The US-China Cyber Agreement: What’s In and What’s Out
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

The Dream of Internet Freedom Doesn’t Have to Die
This post is a version of the introduction to the author’s keynote speech, “The Lifecycle of a Revolution” at this year’s Black Hat information security conference. Twenty…

Legislative Cyber Threats: CISA’s Not The Only One
If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal…