Cybersecurity: LOAC-Military

Latest in Cybersecurity: LOAC-Military

Cybersecurity: LOAC-Military

Crossing a Cyber Rubicon? Overreactions to the IDF’s Strike on the Hamas Cyber Facility

Amid a massive exchange of rocket fire and airstrikes between Israel and both Hamas and Islamic Jihad this weekend, Hamas attempted a cyber operation against an unspecified civilian target in Israel. The operation failed, and in its aftermath the Israel Defense Forces (IDF) carried out an airstrike that destroyed the building housing Hamas’s cyber capability. Some observers are citing the incident as an important—and perhaps dangerous—precedent. Others are questioning the legality of the strike itself. Both these views are misplaced.

Context

Cybersecurity: LOAC-Military

The New Contours of Cyber Conflict

An American military unit used offensive weapons against a target inside Russia. And nobody is noticing.

Let that sink in for a second. As the country (understandably) focuses on matters like Michael Cohen's testimony; the president's self-described friendship with a murderous dictator; and the House vote to negate the president's declaration of a national emergency (all notable issues to be sure), it seems as though something exceedingly significant has happened and ... just disappeared under the radar.

Cybersecurity: LOAC-Military

Livestream: Texas Law Review Symposium on Tallinn Manual 2.0

Today, the Texas Law Review is hosting a symposium on the Tallinn Manual 2.0 at the University of Texas at Austin, featuring panels on "sovereignty in cyberspace, jurisdiction over cyber activities, international human rights law in cyberspace," and more. A livestream of the event is available here.

Subscribe to Lawfare

EmailRSSKindle