hacking
28 Articles

Summary of DOJ Indictment of Iranian 2024 Election Interference
Editor’s note: Readers may also be interested in David Aaron’s analysis of the indictment. On Friday, the Department of Justice announced charges in another state-sponsored…

Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment
What's novel and what's routine in the indictment of the three alleged Iranian government operatives.

Software Backdoor is a Wakeup Call for Cybersecurity
As shown by the xz backdoor, relying on luck is not a sustainable cybersecurity strategy when much of the world depends on secure software.

The Just Security Podcast: Counterterrorism and Human Rights (Part 2 Spyware and Data Collection)
This is Part 2 of a conversation with Fionnuala Ni Aoláin who recently served as UN Special Rapporteur on Human Rights and Counterterrorism.

Spyware Out of the Shadows: The Need for A New International Regulatory Approach
We urgently need a system where the developers of spyware tools are forced either to require their State customers to provide credible guarantees on future human rights compliance,…

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures
Poland's positions push the discussion forward on contested areas of law.

The UN Cybercrime Treaty Has a Cybersecurity Problem In It
Proposals for an international cyber crime treaty could have unintended consequences that undermine the very purpose for its existence.

Empowering Security Researchers Will Improve Global Cybersecurity
China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

On Ransomware, Cyber Command Should Take a Backseat
As concerns about ransomware grow, U.S. policymakers must resist temptations to over-militarize the U.S. response, instead developing cyber capabilities across a range of federal…

It’s Time for Congress to Push Companies to Come Forward on Hacks
The United States can’t address cyber threats from sophisticated nation State actors like Russia and China if it doesn’t know about them.

Hack-to-Patch by Law Enforcement Is a Dangerous Practice
Recent so-called hack-to-patch activity by law enforcement sets a dangerous precedent for the global business community. Serious security, technical, and policy drawbacks emerge…

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack
In a recent operation, the FBI removed malware from hacked Microsoft Exchange servers, and only attempted to notify the servers’ owners after the fact. This approach is almost…