Hostile actions against a computer system or network can take two forms. One form – a cyber attack – is destructive in nature. An example of such a hostile action is erasure by a computer virus resident on the hard disk of any infected computer.
Tag: Cyberespionage
Cyber Threats and the Law of War
When I was invited to participate in a forum dealing with “National Security Threats in Cyberspace,” sponsored by the American Bar Association Standing Committee on Law and National Security and the National Strategy Forum, my assigned role was to provide a “succinct and brief” explanation of how the existing Law of War (LOW) might be applied to cyber threats.