Cyber threats have emerged as one of the most serious dangers to U.S. and global security. Increasingly, malicious actors—some private, but others that appear to be state-sponsored—seek to advance their strategic aims through violent or non-violent cyber-attacks. This Article considers the problem of non-violent, yet still destructive, economic cyber espionage, which targets the intellectual, industrial, and information property of major global powers like the United States. The Article argues that the international community’s reticence is owing to a stale set of international legal norms. The Article explains how existing principles of international law—such as state sovereignty, non-intervention, and state responsibility—should evolve to...
More and more, the United States and other countries rely on complex infrastructures that are primar...
In 1996, Congress passed the Economic Espionage Act (EEA), 18 U.S.C. Sections 1831 and 1832, to help...
Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information o...
Cyber threats have emerged as one of the most serious dangers to U.S. and global security. Increasin...
The number of cyber attacs being carried out by various actors is continually increasing. The vast...
Scholars and policymakers are paying greater attention to the application of international law to th...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain\u2...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Important international law questions for formulating cyber strategy and policy include whether and ...
This article argues that existing international laws of war are inadequate and need to be adjusted a...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
Purpose: The purpose of this paper is to demonstrate that the national security exception will not a...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
More and more, the United States and other countries rely on complex infrastructures that are primar...
In 1996, Congress passed the Economic Espionage Act (EEA), 18 U.S.C. Sections 1831 and 1832, to help...
Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information o...
Cyber threats have emerged as one of the most serious dangers to U.S. and global security. Increasin...
The number of cyber attacs being carried out by various actors is continually increasing. The vast...
Scholars and policymakers are paying greater attention to the application of international law to th...
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious go...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain\u2...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Important international law questions for formulating cyber strategy and policy include whether and ...
This article argues that existing international laws of war are inadequate and need to be adjusted a...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
Purpose: The purpose of this paper is to demonstrate that the national security exception will not a...
Awarded the 2021 European Society of International Law (ESIL) Book Prize during the 16th ESIL Annual...
More and more, the United States and other countries rely on complex infrastructures that are primar...
In 1996, Congress passed the Economic Espionage Act (EEA), 18 U.S.C. Sections 1831 and 1832, to help...
Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information o...