Military Objective or Civilian Object? The Italian National Cybersecurity Agency’s Status in Case of Armed Conflict

Military Objective or Civilian Object? The Italian National Cybersecurity Agency’s Status in Case of Armed Conflict

Military Objective or Civilian Object? The Italian National Cybersecurity Agency’s Status in Case of Armed Conflict The increasing reliance of States on cyber infrastructure for both civilian and military purposes has generated renewed debate on the protection...
The Internal Proportionality Assessment in Cyberspace

The Internal Proportionality Assessment in Cyberspace

The Internal Proportionality Assessment in Cyberspace The International Criminal Tribunal for the former Yugoslavia’s Prosecutor v. Prlić et al. Appeals Chamber judgment, as well as the Eritrea-Ethiopia Claims Commission’s Western Front arbitral award found that a...
In Honor of Françoise Hampson – Fact-Finding in Law of Armed Conflict Investigations

In Honor of Françoise Hampson – Fact-Finding in Law of Armed Conflict Investigations

In Honor of Françoise Hampson – Fact-Finding in Law of Armed Conflict Investigations Editors’ note: This post is part of a series to honor Françoise Hampson, who passed away on April 18, 2025. These posts recognize Professor Hampson’s work and the significant...
Indiscriminate Attacks, Proportionality and the Meaning of “Incidental” Civilian Harm

Indiscriminate Attacks, Proportionality and the Meaning of “Incidental” Civilian Harm

Indiscriminate Attacks, Proportionality and the Meaning of “Incidental” Civilian Harm Editors’ note: This post is based on the author’s article, “Indiscriminate Attacks and the Proportionality Rule: What is Incidental Civilian Harm?” in the Journal of Conflict and...
Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II

Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II

Non-State Cyber Actors in the 12-Day War – The Gray Zone of LOAC, Part II Editors’ note: In a prior post Professor Gary Corn described recent cyber operations undertaken during conflict between Iran and Israel. He related details of the hacking group, Predatory...