JLCW Volume 7, Fall 2019, Issue 2

ARTICLES

  • Democrats and Republicans Seek Federal Jurisdiction Over Cybercrimes by Foreign Actors in DNC v. Russian Federation and Broidy Capital Mgmt. v. State of Qatar
    By Shelly A. Sanford & Meredith Drukker Stratigopoulos
  • From Munitions to Malware: A Comparative Analysis of Civilian Targetability in Cyber Conflict
    By Colton Matheson
  • Cybernetic Enhancement of Soldiers: Conserving hors de combat Protections for Combatants Under the Third Geneva Convention
    By Amanda McAllister
  • New Payment Methods and Insufficiencies in their Regulatory Scheme
    By Angel L. Rodriguez Santiago
  • Cyber Insurance: An Incentive Alignment Solution to Corporate Cyber-Insecurity
    By Lauren Miller
Share

[vc_row][vc_column][vc_column_text]The Navy and its contractors are “under cyber siege” by Chinese hackers who have stolen national security secrets in recent years, an internal review concluded.

Source: Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts[/vc_column_text][/vc_column][/vc_row]

Share

[vc_row][vc_column][vc_column_text]The shift reflects the importance of integrated capabilities, above and beyond cyber.

Source: Army Cyber to Become an Information Warfare Command[/vc_column_text][/vc_column][/vc_row]

Share

[vc_row][vc_column][dt_quote type=”pullquote” background=”fancy”]The United States will do more to disrupt the malicious cyber-activity that foreign adversaries are aggressively using to advance their interests, a National Security Agency official said Thursday. “We have to impose costs in a visible way to start deterrence,” said Rob Joyce, senior cybersecurity adviser at NSA. “We have to go out and try to make those operations less successful and harder to do.” Speaking to an industry association in Hanover, Maryland, Joyce cited the 2017 WannaCry and NotPetya malware outbreaks — and Russia’s use of information operations in the 2016 U.S. election — as examples of nation-states moving from “exploitation to disruption” to impose their will in cyberspace. Washington has blamed North Korea and Russia, respectively, for the devastating WannaCry and NotPetya attacks, which cost billions of dollars in economic damage. Some foreign governments have less legal constraints on their activities in cyberspace than the U.S., Joyce told a local[…][/dt_quote][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]Source: NSA’s Rob Joyce outlines how U.S. can disrupt and deter foreign hacking[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

[/vc_column_text][/vc_column][/vc_row]

Share

International governments are passing laws that allow authorities to pressure tech companies such as Apple and Facebook for access to digital secrets.

Source: Apple and Facebook Fighting International Encryption Battle

Share