17 Items

Robert F. Kennedy Department of Justice Building

EdBrown05/Wikimedia

Analysis & Opinions - Lawfare

The Department of Justice Makes the Next Move in the U.S.-Russia Espionage Drama

| Mar. 16, 2017

On March 15, the U.S. DoJ released an indictment against four Russians in one of the most significant hacking-related law enforcement actions to date. Cyber Security Project's Charley Snyder and Dr. Michael Sulmeyer discuss the indictment and its implications.

Journal Article - University of Pennsylvania Journal of Constitutional Law Heightened Scrutiny

Decrypting the Fifth Amendment: The Limits of Self-Incrimination

| October 2012

In "Decrypting the Fifth Amendment: The Limits of Self-Incrimination in the Digital Era," Vivek Mohan and John Villasenor examine the scope of information protected from compelled self-incriminating disclosure by exploring the boundaries of the contents of the mind. They propose a framework for bringing the foregone conclusion doctrine, which was articulated in 1976, into the digital era, and conclude that the question of what constitutes a "testimonial act" must be revisited to proactively ensure that emerging technologies do not eviscerate the Fifth Amendment privilege against self-incrimination.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security

    Author:
  • Tim Maurer
| September 2011

Cyber-warfare is no longer science fiction and the debate among policy-makers on what norms will guide behavior in cyber-space is in full swing. The United Nations (UN) is one of the fora where this debate is taking place exhibiting an astonishing rate of norm emergence in cyber-space. Most recently, Russia together with China proposed an “International code of conduct for information security” in September 2011 after the U.S. reversed its long-standing policy position in 2010.

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."