The Just Security Podcast: Counterterrorism and Human Rights (Part 2 Spyware and Data Collection)

by , , , and

Nov 27th, 2023

Spyware Out of the Shadows: The Need for A New International Regulatory Approach

by and

May 16th, 2023

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures


Jan 18th, 2023

The UN Cybercrime Treaty Has a Cybersecurity Problem In It


Oct 17th, 2022

Empowering Security Researchers Will Improve Global Cybersecurity

by , and

May 6th, 2022

On Ransomware, Cyber Command Should Take a Backseat


Nov 30th, 2021

It’s Time for Congress to Push Companies to Come Forward on Hacks

by and

May 25th, 2021

Hack-to-Patch by Law Enforcement Is a Dangerous Practice

by and

Apr 30th, 2021

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack


Apr 16th, 2021

The Latest North Korea Cyber Indictment Should Serve as a Model


Feb 24th, 2021

COVID-19 and International Law Series: Vaccine Theft, Disinformation, the Law Governing Cyber Operations

by and

Dec 4th, 2020

The Latest GRU Indictment: A Failed Exercise in Deterrence


Oct 29th, 2020

App Stores as Back-Doors for Government Regulation of End-to-End Encryption


Oct 15th, 2020

When Constitutional Law and Government Hacking Collide: A Landmark U.K. Ruling Is Relevant on Both Sides of the Pond


Jun 19th, 2019

CTRL+HALT+Defeat: State-Sponsored Surveillance and the Suppression of Dissent

by , , and

May 15th, 2019

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking


Jan 11th, 2019

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know


Nov 16th, 2018

Shining a Light on Federal Law Enforcement’s Use of Computer Hacking Tools


Sep 19th, 2018

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act


Nov 20th, 2017

Would the United States Be Responsible for Private Hacking?


Oct 17th, 2017

Trump’s Dangerous Attribution Message on Russian Hacking—and How to Counter It


Jan 10th, 2017

Whose World Is This?: US and UK Government Hacking


Jul 7th, 2016

With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away


Jun 2nd, 2016

Ten National Security Oversight Issues to Watch in 2016


Dec 28th, 2015