This Policy Essay discusses the emerging security threat of cyberterrorism and the historical impulse to restrict civil rights and civil liberties during times of national crisis. Cyberterrorism poses a significant danger that requires a strong and unequivocal response, but such a response need not sacrifice important constitutional safeguards. Frequently in our past, from the time of the two World Wars to the recent attacks on the World Trade Center, our leaders enacted policies that gave an illusion of enhancing security but in reality failed to provide additional safeguards and in the process abused constitutional rights. We argue that this historical pattern need not continue with regard to cyberterrorism. With proper planning and a sen...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Advances in Computer Science continue to provide more tools, each time more efficient, to aid us in ...
Public and private actors engage in cyber warfare. In the private field, the role of individuals is ...
This essay will discuss how intrusive (hacking) cyber espionage in peacetime is legally justified, i...
The threats residing in cyber-space are becoming well understood by policymakers and security expert...
This article explores the links between internet radicalization, access to weapons, and the current ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
For over half a decade, the author has been writing about how and why the institutions modern nation...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Militaristic approaches including U.S. Cyber Command\u27s defend forward and persistent engagemen...
Over the past two decades, the ubiquitousness of the internet has created new reals in which artisti...
Terrorism is one major problem that plagues our world today. The memories of the bombings in the Lon...
Cyberspace has evolved beyond the imagination of most in the last fifteen years to the point that sc...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Advances in Computer Science continue to provide more tools, each time more efficient, to aid us in ...
Public and private actors engage in cyber warfare. In the private field, the role of individuals is ...
This essay will discuss how intrusive (hacking) cyber espionage in peacetime is legally justified, i...
The threats residing in cyber-space are becoming well understood by policymakers and security expert...
This article explores the links between internet radicalization, access to weapons, and the current ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
For over half a decade, the author has been writing about how and why the institutions modern nation...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Militaristic approaches including U.S. Cyber Command\u27s defend forward and persistent engagemen...
Over the past two decades, the ubiquitousness of the internet has created new reals in which artisti...
Terrorism is one major problem that plagues our world today. The memories of the bombings in the Lon...
Cyberspace has evolved beyond the imagination of most in the last fifteen years to the point that sc...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Advances in Computer Science continue to provide more tools, each time more efficient, to aid us in ...