Cyber

Year Ahead 2026 – Poisoned Wells Before The War

Year Ahead 2026 – Poisoned Wells Before The War

In April 2026, and as part of my role at the National University of Singapore, I am hosting a regional conference on the intersection between artificial intelligence (AI) and international humanitarian law (IHL). The conference abstracts are, understandably, all about...

Future of Warfare and Law Series – Introduction

Future of Warfare and Law Series – Introduction

Editors’ note: This post introduces a series featuring topics discussed during the Third Annual Future of Warfare and the Law Symposium. This past May, a community of military legal scholars and technical experts met at the Third Annual Future of Warfare and the Law...

Firewalls and Fault Lines: Cyber War in the Middle East

Firewalls and Fault Lines: Cyber War in the Middle East

Following the Iran-Israel War, a conflict blending relentless Israel Defense Force (IDF) airstrikes with Iranian missile and drone barrages, some Middle Eastern battlefields have quieted, making it easy to forget that a less visible but equally perilous cyber war...

Interning a Hacker

Interning a Hacker

Recently, at a workshop at Harvard Law School, I grappled with the question of internment in any international armed conflict (IAC) in the near future. It is a question some are uncomfortable with, although the concept of internment remains legally available under...

Cyber Attack War Crimes and Ntaganda

Cyber Attack War Crimes and Ntaganda

Editor’s note: This post is based on a portion of the author’s work, “Addressing Unlawful Cyber Operations in Armed Conflict Through Human Rights Bodies Instead of the International Criminal Court,” published at 57 Vanderbilt Journal of Transnational Law 359 (2024)....

The Influence of Weaponry on the Jus ad Bellum

The Influence of Weaponry on the Jus ad Bellum

In an Articles of War post last week, Professor Terry Gill discussed his new book, The Use of Force and the International Legal System, co-authored with Dr. Kinga Tibori Szabó. It is a fascinating journey through the jus ad bellum, the law governing the use of force...

A Digital Red Cross: What Would It Defend Against?

A Digital Red Cross: What Would It Defend Against?

On November 18, 1991, after enduring a three-month artillery assault, the city of Vukovar in Croatia fell to what was then known as the federal Yugoslav People’s Army (JNA) and Serb paramilitary forces. After JNA units took control of a hospital where hundreds of sick...

The Law of Cyber Conflict: Quo Vadis?

The Law of Cyber Conflict: Quo Vadis?

[Editor’s note: The following post highlights a subject addressed in the Lieber Studies volume The Future Law of Armed Conflict, which was published 27 May 2022. For a general introduction to this volume, see Professor Matt Waxman’s introductory post.]   Using...

Terminological Precision and International Cyber Law

Terminological Precision and International Cyber Law

The recent spate of hostile cyber operations by States, non-State groups affiliated with States, and non-State groups operating on their own has resulted in a cacophony of pronouncements and commentary by political leaders, pundits, journalists, and legal experts. As...

When Corporations Take Offensive Measures Against States

When Corporations Take Offensive Measures Against States

Cyberattacks are increasingly inundating the private sector, and most States are unable or unwilling to provide adequate protection against these attacks. To mitigate this challenge, numerous corporations acknowledge that they have engaged in some form of active cyber...