States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability. This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but is the only way to safeguard an “essential interest” ...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
Cyber operations represent one of the main security threats today. The number of cyber operations at...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Countermeasures are an established and instrumental aspect of the international legal system of self...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
Cyber operations represent one of the main security threats today. The number of cyber operations at...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Countermeasures are an established and instrumental aspect of the international legal system of self...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...