Cyber & Technology
Going the Extra Mile: What It Takes to Be a Responsible Cyber Power
The United Kingdom is aspiring to become a responsible democratic cyber power, but this is not without cost.
Latest in Cyber Operations
The United Kingdom is aspiring to become a responsible democratic cyber power, but this is not without cost.
Among the most discussed provisions of the Tallinn Manual 2.0 is Rule 4: “Violation of sovereignty.” Rule 4 provides: “A State must not conduct cyber operations that violate the sovereignty of another State.” Considered alone, Rule 4 is banal and unobjectionable, since there are many established sovereignty-based international-law rules that cyber operations might violate.
To what extent should other agencies have the chance to object on policy or legal grounds when the military wants to conduct a cyber operation that will have effects outside of the Defense Department’s own networks?
In June, US Cyber Command issued Beyond the Build. It presents Admiral Michael Rogers’ vision and guidance for the command and its subordinate units. With little fanfare, the document was publically released in September by the Department of Defense. It has yet to receive much attention. Here’s why everyone should read it.
I was struck by Charlie Dunlap’s take on the DOD Law of War manual regarding cyber operations, especially on how cyberattacks are carried out.