Firewalls and Fault Lines: Cyber War in the Middle East

Firewalls and Fault Lines: Cyber War in the Middle East

Firewalls and Fault Lines: Cyber War in the Middle East Following the Iran-Israel War, a conflict blending relentless Israel Defense Force (IDF) airstrikes with Iranian missile and drone barrages, some Middle Eastern battlefields have quieted, making it easy to forget...
Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II

Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II

Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II Editors’ note: In a prior post Professor Gary Corn described recent cyber operations undertaken during conflict between Iran and Israel. He related details of the hacking group, Predatory...
Data Poisoning as a Covert Weapon: Securing U.S. Military Superiority in AI-Driven Warfare

Data Poisoning as a Covert Weapon: Securing U.S. Military Superiority in AI-Driven Warfare

Data Poisoning as a Covert Weapon: Securing U.S. Military Superiority in AI-Driven Warfare Rapid integration of artificial intelligence (AI) into military platforms has revolutionized modern warfare, providing unprecedented capabilities for decision-making,...
Year Ahead – The Coming Year’s Evolution in the Law of Cyber Operations

Year Ahead – The Coming Year’s Evolution in the Law of Cyber Operations

Year Ahead – The Coming Year’s Evolution in the Law of Cyber Operations Editors’ note: We are pleased to announce that Articles of War has recently added several thematic editors to our staff. Each editor has contributed a post to this year’s Year Ahead series with...
The Evolving Interpretation of the Use of Force in Cyber Operations: Insights from State Practices

The Evolving Interpretation of the Use of Force in Cyber Operations: Insights from State Practices

The Evolving Interpretation of the Use of Force in Cyber Operations: Insights from State Practices Editors’ note: This post is drawn from the author’s article-length work with Professor Michael Schmitt, “Cyberspace and the Jus ad Bellum: The State of Play” appearing...