Discussions of the Espionage Act usually focus on the public’s conception of “spying.” Spies steal information that their government seeks to keep secret and disclose that information to other governments. A common acronym, “MICE,” describes the common motivations for spying: money, ideology, compromise, and ego. The Espionage Act, however, covers a broader set of conduct… Continue reading Willfulness and the Harm of Unlawful Retention of National Security Information
Tag: Cyberespionage
Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability
More and more often, the Foreign Sovereign Immunities Act (FSIA) has protected cyberattack-conducting state actors and their cybersecurity contractors from legal liability and suits brought by victims seeking redress in US courts. Adam Silow argues that it is time for foreign sovereign immunity to receive an update for the digital era. State-sponsored cyberattacks and their… Continue reading Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability
Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations
The United States is under a growing and constant threat of cyberattack. US cybersecurity strategy has evolved in response, adapting to the new threat climate by committing US Cyber Command to more aggressive and persistent peacetime cyber operations. However, the Department of Defense Cyber Mission Force (CMF) has been stretched thin attempting to carry out… Continue reading Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations