Cybersecurity: LOAC-Military

Latest in Cybersecurity: LOAC-Military

Cybersecurity: LOAC-Military

Crossing a Cyber Rubicon? Overreactions to the IDF’s Strike on the Hamas Cyber Facility

Amid a massive exchange of rocket fire and airstrikes between Israel and both Hamas and Islamic Jihad this weekend, Hamas attempted a cyber operation against an unspecified civilian target in Israel. The operation failed, and in its aftermath the Israel Defense Forces (IDF) carried out an airstrike that destroyed the building housing Hamas’s cyber capability. Some observers are citing the incident as an important—and perhaps dangerous—precedent. Others are questioning the legality of the strike itself. Both these views are misplaced.

Context

Cybersecurity: LOAC-Military

The New Contours of Cyber Conflict

An American military unit used offensive weapons against a target inside Russia. And nobody is noticing.

Let that sink in for a second. As the country (understandably) focuses on matters like Michael Cohen's testimony; the president's self-described friendship with a murderous dictator; and the House vote to negate the president's declaration of a national emergency (all notable issues to be sure), it seems as though something exceedingly significant has happened and ... just disappeared under the radar.

Cybersecurity: LOAC-Military

Livestream: Texas Law Review Symposium on Tallinn Manual 2.0

Today, the Texas Law Review is hosting a symposium on the Tallinn Manual 2.0 at the University of Texas at Austin, featuring panels on "sovereignty in cyberspace, jurisdiction over cyber activities, international human rights law in cyberspace," and more. A livestream of the event is available here.

Cybersecurity: LOAC-Military

The New Face of Law and Cyber Warfare

On October 3-4, 2016, I was privileged to be invited to attend and speak at the annual conference organized by the Staff Judge Advocate for USCYBERCOM, Colonel Gary Corn. I attended the two unclassified days of the conference (two days of classified discussion followed). Fellow Lawfare bloggers Bobby Chesney and Carrie Cordero were also in attendance. The conference was under Chatham House rules but with the organizer’s kind permission, I wanted to blog a few of the most salient insights (from my own idiosyncratic perspective) derived from the two days of discussion I observed:

Subscribe to Lawfare

EmailRSSKindle