9 Items

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Analysis & Opinions - Lawfare

Decoding the 2017 NDAA's Provisions on DoD Cyber Operations

| Jan. 30, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Charley Snyder examine some of the most important provisions to the recently signed into law 2017 National Defense Authorization Act that the Trump Administration must grapple with during its first year in office.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

Apple Iphone 6, 16 November 2015

Creative Commons

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Balancing Cyber Security

| March 22, 2016

Michael Sulmeyer, director of the Belfer Center's Cyber Security Project, discusses the U.S. government's efforts to defend against cyber threats in the context of the legal battle between the FBI and Apple over its encryption methods.

2/16/2016: U.S. President Barack Obama meets with former National Security Advisor Tom Donilon (2R) & former IBM CEO Sam Palmisano (2L), who are being appointed as the Chair and Vice Chair respectively of the Commission on Enhancing National Cybersecurity

(AP Photo)

Analysis & Opinions - The Hill

Simplifying Cybersecurity

| February 26, 2016

While there are undoubtedly aspects of the cybersecurity problem that demand complex technological solutions, we submit that the two most beneficial recommendations they can make are more straightforward. The first is to do everything possible to eliminate the vulnerabilities on which attackers depend. The second is to treat cybersecurity principally as a management problem rather than as a technology problem.