hacking

Software Backdoor is a Wakeup Call for Cybersecurity

by

Apr 25th, 2024

The Just Security Podcast: Counterterrorism and Human Rights (Part 2 Spyware and Data Collection)

by , , , , and

Nov 27th, 2023

Spyware Out of the Shadows: The Need for A New International Regulatory Approach

by and

May 16th, 2023

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures

by

Jan 18th, 2023

The UN Cybercrime Treaty Has a Cybersecurity Problem In It

by

Oct 17th, 2022

Empowering Security Researchers Will Improve Global Cybersecurity

by , and

May 6th, 2022

On Ransomware, Cyber Command Should Take a Backseat

by

Nov 30th, 2021

It’s Time for Congress to Push Companies to Come Forward on Hacks

by and

May 25th, 2021

Hack-to-Patch by Law Enforcement Is a Dangerous Practice

by and

Apr 30th, 2021

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack

by

Apr 16th, 2021

The Latest North Korea Cyber Indictment Should Serve as a Model

by

Feb 24th, 2021

COVID-19 and International Law Series: Vaccine Theft, Disinformation, the Law Governing Cyber Operations

by and

Dec 4th, 2020

The Latest GRU Indictment: A Failed Exercise in Deterrence

by

Oct 29th, 2020

App Stores as Back-Doors for Government Regulation of End-to-End Encryption

by

Oct 15th, 2020

When Constitutional Law and Government Hacking Collide: A Landmark U.K. Ruling Is Relevant on Both Sides of the Pond

by

Jun 19th, 2019

CTRL+HALT+Defeat: State-Sponsored Surveillance and the Suppression of Dissent

by , , and

May 15th, 2019

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking

by

Jan 11th, 2019

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know

by

Nov 16th, 2018

Shining a Light on Federal Law Enforcement’s Use of Computer Hacking Tools

by

Sep 19th, 2018

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act

by

Nov 20th, 2017

Would the United States Be Responsible for Private Hacking?

by

Oct 17th, 2017

Trump’s Dangerous Attribution Message on Russian Hacking—and How to Counter It

by

Jan 10th, 2017

Whose World Is This?: US and UK Government Hacking

by

Jul 7th, 2016

With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away

by

Jun 2nd, 2016

Ten National Security Oversight Issues to Watch in 2016

by

Dec 28th, 2015

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

by

Sep 16th, 2014