Raising the Cost to Chinese Hackers
The Director of National Intelligence released his annual threat assessment last week, and cyberattacks top the list. There were at least three headlines in Clapper’s written and oral statements....
View ArticleThe Relationship Between the Biological Weapons Convention and Cybersecurity
Today, the Biological Weapons Convention (BWC)—the first treaty to ban an entire class of weapons—marks the 40th anniversary of its entry into force. Reflections on this milestone will examine the...
View ArticleSanctioning Hackers
President Obama signed an executive order today that allows the U.S. Department of the Treasury to sanction individuals or entities involved in “significant malicious cyber-enabled activities” (you can...
View ArticleThe UN GGE on Cybersecurity: How International Law Applies to Cyberspace
This week, Net Politics is taking a look at the work of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,...
View ArticleThe Messages the Federal Court of Appeals Sent to Congress and the Executive...
Last week, a federal appeals court ruled that Section 215 of the PATRIOT Act does not authorize the NSA’s telephone metadata surveillance program. Since Edward Snowden disclosed it in June 2013, the...
View ArticleTaking Stock of Snowden’s Disclosures Two Years On
Last Friday marked the second anniversary of the start of Edward Snowden’s disclosures. The days preceding this anniversary highlighted Snowden’s continued prominence. On June 1, Section 215 of the USA...
View ArticleThe OPM Hack: Weighing the Damage to U.S. Intelligence
I finally got my letter from the Office of Personnel Management (OPM). What a relief. I was worried my credibility as a commentator would be damaged if my data wasn’t stolen. Imagine how Dan Rather...
View ArticleEspionage in the Digital Era: Lessons From the OPM Hack
Brandon Valeriano is a Senior Lecturer at the University of Glasgow, and recently published Cyber War versus Cyber Realities on Oxford University Press. Stephen Coulthart is a Senior Lecturer in the...
View ArticleRetaliating Against China’s Great Firewall
David Sanger has a very interesting article in Saturday’s New York Times, reporting that the United States has decided to retaliate against China for the hacking of the Office of Personnel Management....
View ArticleIs Hacking Hillary Clinton Russian Payback for the “Freedom to Connect”?
Allegations the Russian government hacked the Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and the Hillary Clinton campaign have generated intense attention,...
View ArticleCongress Needs to Warn Russia on Election Interference
Responding to reports that Russian hackers stole voter lists in Arizona and Illinois, federal officials are scrambling to help states protect voting systems from cyberattacks in the next sixty days....
View ArticleShouting at Americans: A Peek Into French Signals Intelligence
Alex Grigsby is the assistant director for the Digital and Cyberspace Policy program at the Council on Foreign Relations. Something remarkable happened a few months ago. Bernard Barbier, the former...
View ArticleLessons From the Cold War to Combat Modern Russian Disinformation Campaigns
Robert Caruso served in the Department of Defense and Department of State in the administrations of George W. Bush and Barack H. Obama. You can find him on Twitter @robertcaruso. Since Russia’s 2008...
View ArticleThe U.S.-China Cyber Espionage Deal One Year Later
A year ago, presidents Barack Obama and Xi Jinping stood next to each other and declared that neither the U.S. nor Chinese governments “will conduct or knowingly support cyber-enabled theft of...
View ArticleAfter Attributing a Cyberattack to Russia, the Most Likely Response Is Non Cyber
Almost four months after the cybersecurity firm CrowdStrike claimed that two Russian hacker groups were behind the theft of data from computers at the Democratic National Committee and other political...
View ArticleDemocracy and Digital Technology After the 2016 Election
Efforts to understand the causes and consequences of Donald J. Trump’s victory are underway, and this election illuminates features about the relationship between democratic politics and digital...
View ArticleRaising the Cost to Chinese Hackers
The Director of National Intelligence released his annual threat assessment last week, and cyberattacks top the list. There were at least three headlines in Clapper’s written and oral statements....
View ArticleThe Relationship Between the Biological Weapons Convention and Cybersecurity
Today, the Biological Weapons Convention (BWC)—the first treaty to ban an entire class of weapons—marks the 40th anniversary of its entry into force. Reflections on this milestone will examine the...
View ArticleSanctioning Hackers
President Obama signed an executive order today that allows the U.S. Department of the Treasury to sanction individuals or entities involved in “significant malicious cyber-enabled activities” (you can...
View ArticleThe UN GGE on Cybersecurity: How International Law Applies to Cyberspace
This week, Net Politics is taking a look at the work of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,...
View Article