-
The Equifax data breach that compromised the Social Security numbers and other personal information of more than 145.5 million Americans prompted calls from authorities and consumers for more federal reg...
-
Lawmakers and cybersecurity experts weighing in on the Equifax breach face several important jobs: figuring out not only what went wrong and how to fix it but also talking about the problem in a more con...
-
The Chinese government is operationalizing President Xi Jinping’s concept of cyber sovereignty and implementing the country’s new Cybersecurity Law. Four regulations issued since late August show the lea...
-
Today’s rapid advances in artificial intelligence (AI) could disrupt and destabilize the existing military balance—and not necessarily for the reasons that have captured popular imagination. The potentia...
-
On July 20, Judge Steven Jones of the Northern District of Georgia sentenced Evgeny Levitskyy (known by the moniker M.ur.d.e.r.e.r.) to 46 months in prison and three years of supervised release. Levitsky...
-
It is no secret that Silicon Valley and Washington have dramatically different workplace cultures and attitudes toward risk and technology. In the valley, savvy entrepreneurs look to disrupt the status q...
-
Last week, credit reporting outlet Equifax disclosed that they were subject to a massive hack of personally identifiable information that may have compromised the data of as many as 143 million Americans...
-
Unlike most Silicon Valley companies, Apple’s business model is one of "Data Liability." Unlike Google or Facebook which use advertising to extract value from users’ personal information, Apple focuses o...
-
Our electoral infrastructure consists of two distinct pieces (or so it seems to me): a broader public context in which elections occur and a narrower system of election management. To date, almost everyt...
-
This summer, the cases of two cyber criminals posed a stark contrast in rehabilitation and recidivism.
Mark Vartanyan
-
The technology behind elections is hard to get right. Elections require security. They also require transparency: anyone should be able to observe enough of the election process, from distribution of bal...
-
AJIL Unbound, which supplements the American Journal of International Law’s print edition by publishing short, original essays online, today posted a symposium on sovereignty, cyber operations, and the T...