The majority of cyber-attacks in the world are launched by non-state actors, especially criminals looking for money. Most of these cyber-attacks are far from advanced and have relatively little societal consequences. Yet, state actors increasingly also seem to hire non-state actors to launch more severe cyber-attacks with potentially damaging effects for societies abroad. While effectively responding to state-launched cyber-attacks is already a complicated task, this becomes even more difficult when states hide behind non-state actors.How could states respond to non-state cyber-attackers, especially those aiming for large-scale operations harming their societies? This Policy Brief briefly explores the problems in dealing with non-state cybe...
Lewis, JeromeWe are living in the age of technology and the world is becoming more connected. This c...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
The majority of cyber-attacks in the world are launched by non-state actors, especially criminals lo...
Cyber threats, generally including hybrid warfare, are among the greatest challenges that states and...
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispu...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
The global threat of cyber attacks from hostile international and domestic actors against states, co...
This study identifies and explains variation in how states behave in the new security environment of...
The international community has focused too much on addressing cybercrime and cyber hacktivist quest...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible Stat...
Cyberterrorism combines two of the most prominent developments of the last twenty years: the increas...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
Lewis, JeromeWe are living in the age of technology and the world is becoming more connected. This c...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
The majority of cyber-attacks in the world are launched by non-state actors, especially criminals lo...
Cyber threats, generally including hybrid warfare, are among the greatest challenges that states and...
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispu...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
The global threat of cyber attacks from hostile international and domestic actors against states, co...
This study identifies and explains variation in how states behave in the new security environment of...
The international community has focused too much on addressing cybercrime and cyber hacktivist quest...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible Stat...
Cyberterrorism combines two of the most prominent developments of the last twenty years: the increas...
States’ Attribution in Cyber Conflict: From Theoretical Approach to Common Practise Development in i...
Lewis, JeromeWe are living in the age of technology and the world is becoming more connected. This c...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...