Offensive Cyber Warfare

× Clear Filters
7 Articles
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…
Artificial intelligence security cameras using facial recognition technology are displayed at a stand during the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on October 24, 2018. A few people sit at a small table in the booth chatting while others look at the displays on the walls.

One Thousand and One Talents: The Race for A.I. Dominance

Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…
Aerial view of people in white and red to form the Canadian flag.

A Deep Dive into Canada’s Overhaul of Its Foreign Intelligence and Cybersecurity Laws

Following the release of documents by Edward Snowden, many of the Western governments whose agencies’ activities were implicated in the leaks raced to update and modernize their…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II

Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part I

On June 11, 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded beyond countering election interference to…
Text reading, “Scan Result: Virus W32.Sircam.Worm@mm found. File Not cleaned. This file contains a computer worm, a program that spreads very quickly over the Intent to many computers and can delete files, steal sensitive information, or render your machine unusable. This attachment has a virus that may infect your computer. It cannot be cleaned. We recommend that you Do Not download this attachment.”

Planning for ‘Cyber Fallout’ After the Iranian Nuclear Deal

Keep your cyber tools close, your history books closer. For some, the signing of the July 2015 Iran nuclear deal might appear as a “watershed moment” for abating the…
A North Korean national flag on a tall metal structure waving high above all other buildings in Gijungdong as seen from an observation post on September 28, 2017 in Panmunjom, South Korea.

Cyber, Sovereignty, and North Korea–And the Risk of Inaction

Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…
1-7 of 7 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: