by
Gerald Mako
| Aug 6, 2025 | AoW Posts, Blog, Cyber
Firewalls and Fault Lines: Cyber War in the Middle East Following the Iran-Israel War, a conflict blending relentless Israel Defense Force (IDF) airstrikes with Iranian missile and drone barrages, some Middle Eastern battlefields have quieted, making it easy to forget...
by
Ken Watkin
| Feb 24, 2025 | AoW Posts, Blog, Law of Armed Conflict, Targeting
I Spy: Espionage, Perfidy, and Fighting in the Shadows In a 2024 Articles of War post, I identified that intelligence gathering, including espionage, is authorized by both treaty and customary international law during armed conflict. For international armed conflicts,...
by
Anusha Pakkam
| Nov 25, 2024 | AoW Posts, Blog, Cyber, Interpretation & Development, Use of Force
The Evolving Interpretation of the Use of Force in Cyber Operations: Insights from State Practices Editors’ note: This post is drawn from the author’s article-length work with Professor Michael Schmitt, “Cyberspace and the Jus ad Bellum: The State of Play” appearing...
by
William Casey Biggerstaff
| Oct 22, 2024 | AoW Posts, Blog, Ukraine-Russia Symposium, Use of Force
Ukraine Symposium – Ukraine’s “Indefinite” Incursion into Russia and the Jus ad Bellum In early August, following two and a half years of attempts to repulse invading Russian forces from its eastern territories, Ukraine conducted a large-scale ground counteroffensive...
by
Michael N. Schmitt
| Sep 19, 2024 | AoW Posts, Blog, Cyber, Law of Armed Conflict, Policy, Targeting
A Policy Approach for Addressing the “Cyber Attacks” and “Data as an Object” Debates Among the issues examined at this week’s International Society of Military Law and the Law of War’s annual Silent Leges Inter Arma? (In Times of War, the Law Falls Silent?) Conference...