Hostile actions against a computer system or network can take two forms. One form – a cyber attack – is destructive in nature. An example of such a hostile action is erasure by a computer virus resident on the hard disk of any infected computer.
Category: Cybersecurity
“I have found Vol. 4:1 of the Journal of National Security Law & Policy, the Cybersecurity Symposium, to be an invaluable resource. I use many of these articles in my research and clinic preparation, and am glad to have a bound, hard copy that I can grab from my shelf and mark up as I like.” -Eric J. Lobsinger, Teaching Fellow, Georgetown University Law Center
Cyber Threats and the Law of War
When I was invited to participate in a forum dealing with “National Security Threats in Cyberspace,” sponsored by the American Bar Association Standing Committee on Law and National Security and the National Strategy Forum, my assigned role was to provide a “succinct and brief” explanation of how the existing Law of War (LOW) might be applied to cyber threats.