Latest in cyberwar

Cybersecurity and Deterrence

CYBERCOM’s Out-of-Network Operations: What Has and Has Not Changed Over the Past Year?

I’d like to draw attention to Mark Pomerleau’s interesting piece at Fifth Domain examining the operational impact at Cyber Command (CYBERCOM) of several recent developments, including National Security Presidential Memorandum 13 (NSPM 13), doctrinal/policy innovations under the headings of “persistent engagement” and “defending forward,” and new/clarified authorities associated with the most recent National Defense Authorization Act (NDAA).

Aegis Paper Series

Forcing China to Accept that International Law Restricts Cyber Warfare May Not Actually Benefit the U.S.

​This past June, after U.N.-sponsored negotiations on the application of international law to cyber warfare collapsed, lead U.S. negotiator Michele Markoff released a blistering statement criticizing those that “believe their states are free to act in or through cyberspace to achieve their political ends with no limits or constraints on their actions. That is a dangerous and unsupportable view.”

Cybersecurity and Deterrence

U.S. Cyber Responses to Russian Hacking of the November Election

Recent news reports regarding Russian hacks affecting the November election suggest that the United States is preparing on possible U.S. cyber actions in response, such as revealing information to the Russian public about Putin’s financial holdings that would be embarrassing for him. Without comment on whether this would be a wise policy move, it’s necessary to point out that such an action would not be a “cyber response” in any meaningful sense of the term.

The Cyberlaw Podcast

Steptoe Cyberlaw Podcast: An Interview with Fred Kaplan

Was Iran’s cyberattack that bricked vast numbers of Saudi Aramco computers justified by a similar attack on the National Iranian Oil Company a few months’ earlier? Does NSA have the ability to “replay” and attribute North Korean attacks on companies like Sony? And how do the last six NSA directors stack up against each other?


NATO's Designation of Cyber as an Operational Domain of Conflict

NATO recently announced that it will regard cyber as a domain of conflict, joining land, sea, and air as other domains in which conflict may occur. At a press conference on June 14, 2016, NATO Secretary General Jens Stoltenberg said that NATO “will recognize cyberspace as an operational domain, just like air, sea and land. Cyber defence is part of collective defence.

Subscribe to Lawfare