sovereignty

× Clear Filters
72 Articles
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland.

Reassessing U.S. Cyber Operations Against Iran and the Use of Force

"There is good reason to conclude the United States may have crossed the use of force threshold with this cyber operation."
The Netherlands' Minister of Foreign Affairs Stef Blok speaks during a debate about Socialist Party (SP) party chairman Murat Memis at the Senate, in The Hague, on December 26, 2019.

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis

The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…
A map of France with binary computer code.

France’s Major Statement on International Law and Cyber: An Assessment

Leading expert on international law and cyberspace assesses major new position staked out by French government.
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II

Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part I

On June 11, 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded beyond countering election interference to…
US army elite team members participate in the 2011 Commando Forces competition in San Salvador, on June 21, 2011.

The Massive Perils of the Latest U.N. Resolution on Terrorism

A newly proposed U.N. Security Council resolution expanding anti-terrorism requirements for member States targets the nexus with organized crime. But like so many counterterrorism…
High tension electrical power lines at a transfer station along Highway 58 are viewed on March 28, 2017, near Buttonwillow, California.

U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?

Emplacing malware in critical infrastructure on which the civilian population depends is a decision States must not take lightly. It may also violate international law, but 'responding…
United States Secretary of State John F. Kerry signs the UN Arms Trade Treaty (ATT), the first international treaty regulating the global arms trade in conventional arms. September 25, 2013

Why the Arms Trade Treaty Matters – and Why It Matters That the US Is Walking Away

President Donald Trump's decision to "withdraw" from the Arms Trade Treaty is based on a clear misconception of what the treaty is and what it does. To better understand the gravity…

Bolton’s Remarks on the International Criminal Court

On Monday, National Security Adviser John Bolton appeared at the Federalist Society in Washington, D.C., and delivered his first major speech since joining the White House. His…

The Technicolor Zone of Cyberspace, Part 2

What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?

United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights

On Wednesday, the United Kingdom’s Attorney General, Jeremy Wright, QC MP, gave a speech at Chatham House on the role of international law in cyberspace. It is the first official…
A North Korean national flag on a tall metal structure waving high above all other buildings in Gijungdong as seen from an observation post on September 28, 2017 in Panmunjom, South Korea.

Cyber, Sovereignty, and North Korea–And the Risk of Inaction

Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…
1-12 of 72 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: