Matthew Waxman testifies before the Senate Armed Services Committee on the international law dimensions of U.S. cyber strategy and policy.
Latest in cyber
An overview of the memo describing the Department of Defense’s planned implementation of the hiring freeze executive order.
A reminder that Congress can exert significant power when it comes to the roles, responsibilities, and authorities of executive branch agencies. That includes the Department of Defense's approach to military cyber operations.
Amidst the whirlwind of executive orders and presidential memoranda that have been in the news, it was easy to miss a purported draft of President Trump’s first executive order (EO) covering cybersecurity issues, leaked to the Washington Post and released on Friday, January 27. The order, titled “Strengthening U.S. Cyber Security and Capabilities,” calls for several 60- and 100-day assessments of the state of U.S.
In the world of kinetic military operations, collateral damage is typically straightforward to assess because of well-established definitions, well-understood weapon characteristics, and reasonably well-defined legal and policy frameworks. Sasha Romanosky and Zachary Goldman discuss the challenges of extending this framework to cyberattacks with non-physical consequences.
A new cyber policy book, Cyber Insecurity: Navigating the Perils of the Next Information Age, is out this month.
State-Sponsored Doxing and Manipulation of the U.S. Election: How Should the U.S. Government Respond?
As Thomas Rid explains in this terrific piece in Esquire, the Russian government has developed a remarkable capacity for blending the fruits of espionage with information operations designed to manipulate public opinion abroad. It has deployed this capacity in the past in various contexts without generating much discussion in U.S. circles, but recent activities apparently designed to impact the U.S.
Global conversations are often skewed in favor of the countries that generate data or possess the technological capability to access it. The encryption debate in countries with advanced technical capacities is very different from the countries without them.