Purpose: This chapter is designed to provide an understanding of the challenging issues raised by cyber attacks and cyber exploitations under the international laws of war. These laws are premised on the assumption of kinetic action that does not translate easily into the cyber realm. Concepts Covered: Jus ad Bellum, Jus in Bello, Espionage
EDIT PLAYLIST INFORMATIONDELETE PLAYLIST
Edit playlist item notes below to have a mix of public & private notes, or:
Students may find it useful to acquaint themselves at the outset of this course with the basic sources of international law and some of the most important international institutions. The following is a brief overview.
Purpose: To provide an understanding of the international law that governs when it is legitimate to begin war, what counts as war for those purposes, and what counts as neutrality (and breaches of neutrality). The jus ad bellum is governed primarily by the United Nations Charter and customary international law.
Purpose: To provide an understanding on the practice of secretly gathering information about a foreign government or industry. Espionage is not generally regulated by international law. This is important because it means that a great deal of threatening cyber behavior – basically, everything that comes under the heading of “cyber-exploitation – is not regulated by international law.
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.