The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Cyber Terrorism

  • From Vol. 3 No.14 (Jul. 12, 2017)

    International Law Playing Cybersecurity Catch-Up (Part One of Two) 

    Cybersecurity is a global concern requiring international coordination with respect to nation-state attacks and data-driven cross-border transactions and investigations. International organizations, nation states, and academic commentators continue to call for specific cybersecurity international laws or treaties. But with a few exceptions, nation states are continuing to borrow from traditional frameworks. This results in imperfect analogies, causing uncertainty for nations, businesses and individuals. In this two-part guest article series, Hughes Hubbard attorneys Seth Rothman and Andreas Baum address the intersection of cybersecurity and international law. Part one provides insight into cyber warfare and the relevant laws and treaties that are being used to create a framework for this shifting threat. Part two will explore laws related to cyber crimes and international laws that regulate business activities. See also “Prosecuting Borderless Cyber Crime Through Proactive Law Enforcement and Private Sector Cooperation” (Mar. 2, 2016).

    Read Full Article …
  • From Vol. 2 No.13 (Jun. 22, 2016)

    ISIL-Linked Hacker Pleads Guilty in First-of-Its-Kind Cyber Terror Case

    Hackers are not only breaching companies’ systems for their own monetary gain – they can be “cyber terrorists,” acting on behalf of nation-states or movements. After successful international cooperation, on June 15, 2016, one such terrorist, Kosovo citizen Ardit Ferizi, pled guilty to charges of providing material support to the Islamic State of Iraq and the Levant. He stole PII from an Illinois company to help ISIL threaten U.S. military and government personnel. “The case against Ferizi is the first of its kind, representing the nexus of the terror and cyber threats,” Assistant Attorney General for National Security John Carlin said. See also “Prosecuting Borderless Cyber Crime Through Proactive Law Enforcement and Private Sector Cooperation” (Mar. 2, 2016).

    Read Full Article …
  • From Vol. 2 No.5 (Mar. 2, 2016)

    How the American Energy Industry Approaches Security and Emphasizes Information Sharing

    The North American bulk power system, a large, complex machine consisting of thousands of generation plants and thousands of miles of transmission lines, has become a model for cybersecurity, according to Marcus Sachs, senior vice president and chief security officer of North American Electric Reliability Corporation, a not-for-profit regulatory authority. In this guest article, Sachs discusses how the industry has avoided loss-of-load events due to a cyber or physical attack on a power plant, and steps the industry is taking to address cyber threats, including its continued focus on information sharing, where it has been a leader for other sectors. Sachs will be a panelist at the Financial Times Cyber Security Summit on March 16, 2016 in Washington, D.C. See also “Energy Industry Demonstrates Public-Private Cybersecurity Coordination” (Oct. 14, 2015).

    Read Full Article …
  • From Vol. 1 No.5 (Jun. 3, 2015)

    In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

    In a wide-ranging and frank conversation with WilmerHale partner Ben Powell at the annual Georgetown Cybersecurity Law Institute, FBI Director James Comey likened the cybersecurity dangers the country faces to an “evil layer cake” and called general counsels (including himself in his former role) “obstructionist weenies.”  This article, the first part of the CSLR’s two-part series, covers Comey’s remarks about: how the FBI has adapted its techniques in the face of cyber threats; the FBI’s relationship with local law enforcement agencies and the private sector; his concerns about the encryption of data; and how the FBI has expanded its information-sharing programs with the private sector.  In the second part, we will cover Comey’s views on: the role of the FBI in relation to other law enforcement agencies; international cybersecurity developments; international cooperation in a post-Snowden world; misperceptions about the FBI that he hears from the private sector; information-sharing legislation; and how the FBI competes with the private sector for talent.  See also “After a Cyber Breach, What Laws Are in Play and Who Is Enforcing Them?,” The Cybersecurity Law Report, Vol. 1, No. 4 (May 20, 2015).

    Read Full Article …
  • From Vol. 1 No.3 (May 6, 2015)

    Gibson Dunn Attorneys Discuss the Impact of Obama’s Executive Order Creating New Tools to Fight Cyber Attacks

    On April 1, 2015, President Obama issued an Executive Order declaring that the threats caused by “malicious cyber-enabled activities” had created a state of national emergency.  The order launches a sanctions program targeting foreign cyber attackers, allowing regulators to freeze assets and bar financial transactions, among other things.  Gibson, Dunn & Crutcher partners Alexander Southwell, Judith Lee, Jose Fernandez and associates Stephenie Gosnell Handler and Eric Lorber discussed the impact of this important order and these new tools with The Cybersecurity Law Report.

    Read Full Article …