We might expect international law to specifically address cyber attribution requirements due to the significance of attribution in framing the legal responsibility of States and the boundaries of responsive actions by victim States. However, there is little international law of cyber attribution, and what law there is exists largely by implication. Likewise, there is only a murky and highly contested law of State responsibility that theoretically constrains the vast majority of State-sponsored cyberattacks. Because victim States cannot engage in countermeasures unless they attribute a cyberattack to a State, attribution can serve simultaneously to constrain and empower victim States. However, the lack of a common understanding about whether...
The ever-growing use of cyber space has proven the modern technological development. Although the u...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
This paper presented at the Cyberspace 2017 conference in Brno, Czech Republic, examines the role of...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
Considering the role of attribution in the law of state responsibility, this article examines the te...
This symposium explores some of the legal issues surrounding the attribution of cyber conduct to sta...
In late 2018, the U.S. Secretary of Homeland Security suggested that “cyber-attacks now exceed the r...
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in internationa...
This is the author accepted manuscript. The final version is available from OUP via the DOI in this ...
This article is the result of an international research project organized by the Federmann Cyber Sec...
State-sponsored cyber-attacks are on the rise and show no signs of abating. Despite the threats pose...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Adverse cyber operations against States are on the rise, and so are the legal challenges related to ...
The ever-growing use of cyber space has proven the modern technological development. Although the u...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
This paper presented at the Cyberspace 2017 conference in Brno, Czech Republic, examines the role of...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
Considering the role of attribution in the law of state responsibility, this article examines the te...
This symposium explores some of the legal issues surrounding the attribution of cyber conduct to sta...
In late 2018, the U.S. Secretary of Homeland Security suggested that “cyber-attacks now exceed the r...
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in internationa...
This is the author accepted manuscript. The final version is available from OUP via the DOI in this ...
This article is the result of an international research project organized by the Federmann Cyber Sec...
State-sponsored cyber-attacks are on the rise and show no signs of abating. Despite the threats pose...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Adverse cyber operations against States are on the rise, and so are the legal challenges related to ...
The ever-growing use of cyber space has proven the modern technological development. Although the u...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
This paper presented at the Cyberspace 2017 conference in Brno, Czech Republic, examines the role of...