All Journal: Technology & Cybersecurity items

CybercrimeCyberespionage

Transnational Government Hacking

Big DataCybercrime

Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime

Big DataCyberespionage

Challenges and Opportunities in State and Local Cybercrime Enforcement

Big DataCyberespionage

Full Count?: Crime Rate Swings, Cybercrime Misses and Why We Don’t Really Know the Score

CybercrimeCyberespionage

Advancing Accurate & Objective Cybercrime Metrics

Big DataCybersecurity

Defining the Scope of “Possession, Custody, or Control” for Privacy Issues and the CLOUD Act

CyberespionageCybersecurity

Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Big DataCyberespionage

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Book ReviewsCyberespionage

Projecting Power: How States Use Proxies in Cyberspace

CyberespionageIntelligence

Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings

Big DataIntelligence

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus

Big DataCyberespionage

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

Emerging TechnologyInternational Law

Machine Learning, Artificial Intelligence, and the Use of Force by States

Big DataCyberespionage

Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform

Big DataSurveillance

Before Privacy, Power: The Structural Constitution & the Challenge of Mass Surveillance

CyberespionageCybersecurity

Understanding Cyber Collateral Damage

Big DataCyberespionage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

CyberespionageCybersecurity

The 2014 Sony Hack and the Role of International Law

Human Rights in Cyberspace

How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union

Big DataCyberespionage

Deterring Financially Motivated Cybercrime

Human Rights in Cyberspace

State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace

Big DataSurveillance

An Essay on Domestic Surveillance

CyberespionageCybersecurity

Spying & Fighting in Cyberspace: What is Which?

Cybersecurity

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model