Articles

52 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

iPad Mini Smart Case

Wikimedia CC/Ashley Pomeroy

Journal Article - Journal of Cybersecurity

Privacy Threats in Intimate Relationships

| 2020

This article provides an overview of intimate threats: a class of privacy threats that can arise within families, romantic partnerships, close friendships, and caregiving relationships. The authors survey a range of intimate relationships and describe their common features. Based on these features, they explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

People at Seoul Train Station watch a a local news program reporting about a North Korean missile launch. Aug. 30, 2017 (Lee Jin-man/Associated Press).

Lee Jin-man/Associated Press

Journal Article - The RUSI Journal

North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement

| Oct. 17, 2018

Despite one of the most extensive sanctions regimes in history, including an embargo on missile technologies, North Korea has taken huge steps forward in its ballistic missile programme. Daniel Salisbury explores the limitations of, and challenges of implementing, supply-side approaches to missile nonproliferation. Considering North Korea’s recent progress and efforts to evade sanctions, the article highlights the continuing need to strengthen efforts to counter illicit trade in missile-related technologies.

Blogtrepreneur/Flickr

Blogtrepreneur/Flickr

Journal Article - Nonproliferation Review

Solving the Jurisdictional Conundrum: How U.S. Enforcement Agencies Target Overseas Illicit Procurement Networks Using Civil Courts

| September 2018

Over the past two decades, the United States has increasingly turned to targeted sanctions and export restrictions, such as those imposed against Iran and North Korea, in order to curb the spread of weapons of mass destruction. One vexing problem, however, is how to contend with jurisdictional hurdles when the violations occur overseas, in countries that are unable or unwilling to assist US enforcement efforts. To solve this problem, US prosecutors are turning to strategies with significant extraterritorial implications—that is, exercising legal authority beyond national borders. One such tool is to use civil legal procedures to seize assets linked to sanctions or export-control violations in jurisdictions that lack cooperative arrangements with US enforcement agencies. While this may be an attractive strategy to bolster enforcement efforts against overseas illicit procurement, using such tools is not without consequence. This article explores the political, legal, and technical implications of enforcing extraterritorial controls against overseas non-state actors by exploring the recent uses of civil-asset forfeiture against Iranian and North Korean procurement networks.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators. 

Journal Article - Strife

A Beginner's Guide to the Musical Scales of Cyberwar

| Dec. 28, 2016

"Whether you are a cybersecurity professional, policymaker, or student, this article is a beginner's guide to understanding the 'musical scales' of cyberwar. Using the analogy of a piano keyboard, it aims to promote an understanding of what constitutes a use of force in cyberspace and how a state may lawfully respond."