The enforcement of neutrality in cyberspace has not yet occurred, and there appears to be no policy for enforcement. This article suggests a rubric using existing laws for exerting executive authority. Section I of this article discusses the emergence of conflict in cyberspace. This article focuses on the executive branch\u27s authority to enforce neutrality in cyberspace. Section II provides a basic rubric of neutrality rules as applied to conflict in cyberspace. Section III analyzes the most recent cyberconflict, the Georgian-Russian War of 2008, and the potential consequences the United States risked because it lacked a cyber neutral position. Finally, the article concludes with an assessment of the need for a greater exertion of authori...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
"Cyberspace" is often treated as a new domain of State activity in international legal discourse. Th...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
The myth that cyberspace is a legal Wild West has been roundly rejected by states and scholars. As c...
The myth that cyberspace is a legal Wild West has been roundly rejected by states and scholars. As c...
This Article examines Information Warfare--that is, actions taken to affect adversary information an...
The application of international law and legal principles in cyberspace is a topic that has caused c...
This is the final version. Available from Taylor via the DOI in this record. The bright lines betwee...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
"Cyberspace" is often treated as a new domain of State activity in international legal discourse. Th...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
Classically, States and non-State actors were differentiated not only by disparities in legal status...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
The myth that cyberspace is a legal Wild West has been roundly rejected by states and scholars. As c...
The myth that cyberspace is a legal Wild West has been roundly rejected by states and scholars. As c...
This Article examines Information Warfare--that is, actions taken to affect adversary information an...
The application of international law and legal principles in cyberspace is a topic that has caused c...
This is the final version. Available from Taylor via the DOI in this record. The bright lines betwee...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
This is the author accepted manuscript. The final version is available from CUP via the DOI in this ...