Science and Technology

U.S. Imposes Sanctions Against Russia in Response to Cyberattacks (December 28, 2016)

Author: 
Caitlin Behles

On December 28, 2016, the White House announced an executive order increasing sanct

U.K. Parliament Passes "Investigatory Powers Bill" (November 15, 2016)

Author: 
Eric A. Heath

On November 15, 2016, the U.K.

Court of Justice of the European Union Rules Beneficiary of Patent License Must Pay Royalty Even if it Does Not Infringe the Patented Technology (July 7, 2016)

Author: 
Catherina Valenzuela-Bock

On July 7, 2016, the Court of Justice of the European Union

Blog Name: 

The Emergence of Cyber Deterrence: Implications for International Law

Author: 
Rachel E. VanLandingham

Kathleen A. Doty, University of Georgia School of Law, moderated this terrific panel. Jonathan E. Davis, Office of the Legal Adviser, U.S.

European Parliament Votes to Refuse Snowden Extradition (October 29, 2015)

Author: 
Catherina Valenzuela-Bock

On October 29, 2015, the European Parliament voted to approve a resolution calling on member states to “drop any criminal charges against Edward Snowden, grant him protection and consequently preve

The European Court of Justice Declares the Commission’s U.S. “Safe Harbour” Decision Invalid (October 6, 2015)

Author: 
Catherina Valenzuela-Bock

On October 6, 2015, the European Court of Justice (Court)

European Union and the U.S. Complete Data Protection Umbrella Agreement (September 8, 2015)

Author: 
Catherina Valenzuela-Bock

On September 8, 2015, the European Union and the U.S.

The First Case of Cyberwar in Non-International Armed Conflict? The Matrix in Iraq

The multi-faction insurgency that has been tearing Iraq apart ever since the fall of Saddam Hussein’s regime in 2003 has often involved the use of such crude and indiscriminate methods and means of warfare as the suicide bomb and the improvised explosive device. But in mid-2014 there were reports that some aspects of the armed conflict had risen to unexpected heights of contemporary sophistication, with the apparent use of cyberspace as a domain for hostilities.

Topic: 
Volume: 
19
Issue: 
18
Author: 
David Turns
Image: