All Journal: Cybersecurity items

CybercrimeCyberespionage

Zero-Day Delivery: Hacking Risks and the Use of Machine Learning for Military Logistics

CybersecurityDefense Policy

A New Framework for Cyber Operations: Reevaluating Traditional Military Activities and Intelligence Collection in the Digital Age

CybercrimeCyberespionage

Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?

CybercrimeCyberespionage

Shot in the Dark: Can Private Sector “Hackbacks” Work?

CybersecurityEmerging Technology

A Multiverse of Metaverses

CybersecurityReligious Extremism

Social Media—A Tool for Terror?

CybercrimeCyberespionage

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

CybercrimeCyberespionage

Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations

CyberespionageCybersecurity

Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

CybersecurityEmerging Technology

Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community

Cybersecurity

Building Cyber Walls: Executive Emergency Powers in Cyberspace

Cybersecurity

Reordering the Law for a China World Order: China’s Legal Warfare Strategy in Outer Space and Cyberspace

CybercrimeCyberespionage

Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity

CybercrimeCyberespionage

Transnational Government Hacking

Big DataCybercrime

Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime

Big DataCyberespionage

Challenges and Opportunities in State and Local Cybercrime Enforcement

Big DataCyberespionage

Full Count?: Crime Rate Swings, Cybercrime Misses and Why We Don’t Really Know the Score

CybercrimeCyberespionage

Advancing Accurate & Objective Cybercrime Metrics

Big DataCybersecurity

Defining the Scope of “Possession, Custody, or Control” for Privacy Issues and the CLOUD Act

CyberespionageCybersecurity

Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Big DataCyberespionage

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Book ReviewsCyberespionage

Projecting Power: How States Use Proxies in Cyberspace

Big DataCyberespionage

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

Big DataCyberespionage

Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform