State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious governmental cyber conduct and active cyber defense. Though some argue that cyberspace is a law-free zone, offensive cyberattacks are almost always unlawful regardless of their purpose. This Article contends that international law can provide for legal boundaries in cyberspace and analogizes cyber misconduct to government actions such as espionage. So long as conditions provided by international law (such as notice, necessity, and proportionality) are met, countermeasures to malicious cyber operations are generally lawful. Cases of urgency may be an exception to this general rule but should not involve the use of force. Moreover, a government p...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...
The recent spate of hostile cyber operations by States, non-State groups affiliated with States, and...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
Adverse cyber operations against States are on the rise, and so are the legal challenges related to ...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
The number of cyber attacs being carried out by various actors is continually increasing. The vast...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
Considering the role of attribution in the law of state responsibility, this article examines the te...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
This is the author accepted manuscript. The final version is available from OUP via the DOI in this ...
Cyber threats have emerged as one of the most serious dangers to U.S. and global security. Increasin...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...
The recent spate of hostile cyber operations by States, non-State groups affiliated with States, and...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
Adverse cyber operations against States are on the rise, and so are the legal challenges related to ...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
The number of cyber attacs being carried out by various actors is continually increasing. The vast...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
Considering the role of attribution in the law of state responsibility, this article examines the te...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
This is the author accepted manuscript. The final version is available from OUP via the DOI in this ...
Cyber threats have emerged as one of the most serious dangers to U.S. and global security. Increasin...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...
The recent spate of hostile cyber operations by States, non-State groups affiliated with States, and...