States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability. This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but is the only way to safeguard an “essential interest” of ...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
Cyber operations represent one of the main security threats today. The number of cyber operations at...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Today\u27s threats recognize no national boundaries, are connected, and must be addressed at the glo...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
Cyber operations represent one of the main security threats today. The number of cyber operations at...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Today\u27s threats recognize no national boundaries, are connected, and must be addressed at the glo...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...