The recent spate of hostile cyber operations by States, non-State groups affiliated with States, and non-State groups operating on their own has resulted in a cacophony of pronouncements and commentary by political leaders, pundits, journalists, and legal experts. As illustrated by cyber operations such as SolarWinds and the Microsoft Exchange operations attributed to China, much of the discussion reveals a misunderstanding of how international law applies to cyber operations. This misunderstanding can often be traced to misuse of legal terms like attribution, countermeasures, below-the-threshold operations, due diligence, use of force, self-defense, cyberwar (armed conflict), and attack. Frequently, the terminological imprecision leads to ...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
Malicious cyber activities are becoming more and more commonplace, including between nations. This h...
Defence date: 9 November 2016Examining Board: Professor Nehal Bhuta, European University Institute (...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
The internet has created enormous global changes. People can interact with others anyplace, anytime ...
Important international law questions for formulating cyber strategy and policy include whether and ...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
Malicious cyber activities are becoming more and more commonplace, including between nations. This h...
Defence date: 9 November 2016Examining Board: Professor Nehal Bhuta, European University Institute (...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
The internet has created enormous global changes. People can interact with others anyplace, anytime ...
Important international law questions for formulating cyber strategy and policy include whether and ...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...