Understanding Cyber Collateral Damage

In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm. Arguing that unintended effects on data alone can constitute collateral damage, Romanosky and Goldman propose ways for the US military and law enforcement to conceptualize and estimate collateral damage in the context of cyber operations. Understanding… Continue reading Understanding Cyber Collateral Damage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

Jennifer Daskal describes the challenges facing law enforcement access to data across borders and examines the legal and political issues at stake in formulating clear standards for cross-border access to data. Daskal also presents possible mechanisms for establishing a framework for law enforcement access to content and non-content data in foreign jurisdictions.

The 2014 Sony Hack and the Role of International Law

In this article, Clare Sullivan posits that the 2014 hack of Sony Pictures Entertainment (“Sony Hack”) heralds the arrival of a new form of modern warfare. She argues that the current state of international law is inadequate to deal with hacks like this one, which do not cause physical damage but which nonetheless result in… Continue reading The 2014 Sony Hack and the Role of International Law