Christopher Mohr analyzes the opportunities and hacking and other risks of incorporating machine learning into military logistics and identifies legal and security gaps that make incorporation difficult. Mohr begins by providing background on artificial intelligence and machine learning and describes how these tools can improve military logistics. Mohr also identifies types of cyberattacks that states… Continue reading Zero-Day Delivery: Hacking Risks and the Use of Machine Learning for Military Logistics
Tag: Cyberespionage
Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?
There are generally four concepts in international law that describe a state’s wrongful acts: violation of sovereignty, prohibited intervention, use of force, and armed attack. These four concepts emerged in the pre-internet era, thus the application of them in cyberspace has caused many disagreements. However, notwithstanding the disagreements on the scope of any particular concepts,… Continue reading Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?
Shot in the Dark: Can Private Sector “Hackbacks” Work?
In an era when cyberattacks are becoming ever more prevalent, there is a growing demand for private companies to “hackback” to deter and defend against attacks. But federal law precludes them from doing so. Sam Parker addresses the risks and benefits of allowing companies to respond to cyber-threats by going on the offensive and analyzes… Continue reading Shot in the Dark: Can Private Sector “Hackbacks” Work?