Offensive cyber operations

Latest in Offensive cyber operations

Cybersecurity and Deterrence

France, Cyber Operations and Sovereignty: The ‘Purist’ Approach to Sovereignty and Contradictory State Practice

The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with the state practice of cyber-capable states.

Cybersecurity

Loud Cyber Weapons-A Coda

In a previous post, I commented on the apparent desire of U.S. Cyber Command to develop "loud" cyber weapons, that is, weapons whose use could be easily attributable. But further conversation with various people suggest one additional wrinkle important enough to warrant a separate posting here (rather than just updating the original article).

Subscribe to Lawfare

EmailRSSKindle