Cyber attacks require distributed deterrence involving private and public actors. Can the classics of international law help?
News and Research articles on US Federal Bureau of Investigation (FBI)
This paper is part of Geopolitics, jurisdiction and surveillance, a special issue of Internet Policy Review guest-edited by Monique Mann and Angela Daly. Introduction Since the Snowden revelations in 2013 (see e.g., Lyon, 2014; Lyon, 2015) an ongoing policy issue has been the legitimate scope of surveillance, and the extent to which individuals and groups can assert their fundamental rights, including privacy. There has been a renewed focus on policies regarding access to encrypted communications, which are part of a longer history of the ‘cryptowars’ of the 1990s (see e.g., Koops, 1999). We examine these provisions in the Anglophone ‘Five Eyes’ (FVEY) The FVEY partnership is a comprehensive …
Internet companies are conduits through which states can exercise their authority beyond their borders. As Chinese companies such as Huawei become more commercially dominant, they threaten the geopolitical power of the US.
Several countries have adopted counter terrorism legal frameworks in the past two decades. By framing the Ethiopian Anti-Terrorism Proclamation of 2009 as an extension of the ruling party’s neopatrimonial design, this article examines the law’s draconian effects on freedom of speech in Ethiopia’s digital sphere.
Is Bitcoin a fair and reliable currency? Contrary to what its proponents might hope, Bitcoin is far from fulfilling their expectations.
This paper explores how four approaches to cyber security are constructed, motivated and justified by different values such as privacy, economic order and national security and what this means for the actors involved.
The internet and its regulation are the result of continuous conflicts. By analysing policy fields as fields of struggle, this essay proposes to observe processes of discursive institutionalisation to uncover core conflicts inscribed into internet policy.