Cybersecurity

© User:Colin, Wikimedia Commons / Cncplayer (background)

As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals' stealing credit card and social security number information to foreign governments' hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.

Latest in Cybersecurity

Transition 2016

ODNI Releases Report on "Assessing Russian Activities and Intentions in Recent US Elections"

The Office of the Director of National Intelligence has published a declassified version of the intelligence community's report on "Assessing Russian Activities and Intentions in Recent U.S. Elections," written by CIA, FBI, and NSA.  President Barack Obama and President-elect Donald Trump have now been briefed on the classified version of the report.

The report is available here and is also included below.

Transition 2016

Senate Armed Services Committee Hearing on "Foreign Cyber Threats to the United States"

The Senate Armed Services Committee is currently holding a hearing on "Foreign Cyber Threats to the United States,"featuring testimony by DNI James Clapper, NSA Director Admiral Michael Rogers, and Under Secretary of Defense for Intelligence Marcel Lettre. Video of the hearing is available here. 

Privacy Paradox

Follow Buddies and Block Buddies: A Simple Proposal to Improve Civility, Control, and Privacy on Twitter

In order to address growing concerns over the use of the platform for online harassment, Twitter should expand its current system of letting users designate whom they “block” and “follow” to let users designate other users whose blocks and follows their accounts will replicate.

Subscribe to Lawfare

EmailRSSKindle