I recently had the pleasure and privilege of convening a workshop on the legal aspects of hybrid warfare and influence operations at the Strategy and Security Institute of the University of Exeter in the United Kingdom. Held in collaboration with the NATO Office of Legal Affairs (many thanks to NATO Legal Adviser Steven Hill) and the Allied Rapid Reaction Corps, the event brought together senior legal advisors and experts working in a national and international capacity over the course of one and a half days.
Latest in Cybersecurity: LOAC-Military
Ben Wittes’ commentary about hybrid conflict asks “what is really new in this idea of hybrid conflict”?, and answers by giving a cyber example that falls at the seams of existing international law. He points out that when government officials do not know how to apply existing law or what laws do apply, they don’t apply anything at all.
I spent a day and half this week at the Pentagon at a remarkable symposium on so-called "hybrid conflicts" organized by the office of the legal adviser to the Joint Chiefs of Staff. The conference took place under Chatham House rules, so I'm constrained in describing the proceedings in any detail, but as it will be of particular interest to Lawfare readers, I will do the best I can.
Yesterday, Chairman of the Joint Chiefs of Staff General Martin Dempsey unveiled the the Pentagon's new 2015 National Military Strategy. Revising the 2011 National Military Strategy, General Dempsey indicated that the security landscape the United States faces is dramatically different than four years ago.
According to this report fro
This past week, the NATO Cooperative Cyber Defense Center of Excellence put on its annual Cyber Conflict conference in Tallinn, Estonia. The conference boasted a number of experienced cyber-hands, including Adm. Mike Rodgers, DefCon founder Jeff Moss, and law of armed conflict expert Mike Schmitt. One of the most interesting sessions, which included a presentation by Mike, focused on aspects of the Tallinn Manual versions 1.0 and 2.0. Version 1.0, produced by an independent group of experts, came out in 2013.
Earlier this month, the government of the Netherlands hosted a Global Conference on Cyberspace, which was, apparently, fairly well received, as the Chair's Statement suggests.
One important side event, for readers of this blog, was a conference of state legal advisers from over 35 States at a “Tallinn Manual 2.0 consultation meeting.” The authors who produced the https://ccdcoe
Today, Secretary of Defense Ashton Carter unveiled the Pentagon's new cybersecurity strategy at Stanford University in a speech entitled "Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity."
The New York Times has an editorial today, calling for an arms control effort in cyberspace. The Times effort is, honestly, a bit simplistic, as is its conclusion:
The tougher challenge is on the global level. Cyberwarfare has already done considerable damage and can lead to devastating consequences. The best way forward is to accelerate international efforts to negotiate limits on the cyberarms race, akin to the arms-control treaties of the Cold War.
Jacob Appelbaum, Laura Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations to infiltrate and exploit networks around the world. There's a lot here: 199 pages.