Cybersecurity: LOAC-Military

Latest in Cybersecurity: LOAC-Military

Cybersecurity: LOAC-Military

Crossing a Cyber Rubicon? Overreactions to the IDF’s Strike on the Hamas Cyber Facility

After the Israel Defense Forces announced it launched an airstrike on a Hamas facility used for cyber operations, some observers warned that a dangerous line had been crossed and others questioned the legality of the strike itself. Both are wrong.


Moving Forward on Cyber Norms, Domestically

In the wake of a recent failure to reach international consensus on the application of international law to cyber activities, the United States should seek to shape norms unilaterally by continuing to assertively investigate and indict individuals—including state actors—who engage in cyber activities that the U.S. Government ultimately would like to see the international community characterize as wrongful.

Cybersecurity: LOAC-Military

Livestream: Texas Law Review Symposium on Tallinn Manual 2.0

Today, the Texas Law Review is hosting a symposium on the Tallinn Manual 2.0 at the University of Texas at Austin, featuring panels on "sovereignty in cyberspace,  jurisdiction over cyber activities, international human rights law in cyberspace," and more. A livestream of the event is available here.

The Russia Connection

The DNC Hack Demonstrates the Need for Cyber-Specific Deterrents

The United States' seemingly insufficient reaction may have been informed by international law; the United States might have responded to the DNC hack as it did because international law did not permit it to do more. Limited state recourse to escalatory self-help measures is a feature of the modern international legal order—but, as the DNC hack, Sony hack, and growing number of similar cyber-enabled interferences demonstrate, in cyberspace this feature may have become a bug. 

Subscribe to Lawfare