Blog Posts: Cyberwarfare

Cyberwar and Sony

On November 14, 2014, Sony Pictures Entertainment was hacked, locking employees out of their computers, compromising important internal data, and leaking unreleased movies onto the internet. In response to the attack, President Obama said the U.S. would "respond proportionately." The President’s authority to respond proportionately to the Sony attacks is based in principles of international law.


Read More... (Cyberwar and Sony)
Posted by Andrew D. Johnstone on Wed. January 21, 2015 11:16 AM
Categories: Cyberwarfare, International Law, North Korea, United States

Symposium Review: Is There a Need for International Cyber Warfare Treaties?

During North Carolina Journal of International Law and Commercial Regulation’s 2014 symposium, various panelists offered their views on the growing area of cyber warfare. Cyber warfare is a relatively new development that is creating ethical and legal ambiguity under current international law. Modern international law recognizes the idea of jus ad bellum, literally translated to mean “right to war”. This theory determines situations when it is lawful to resort to war. The United States, and now most countries, claim . . .


Read More... (Symposium Review: Is There a Need for International Cyber Warfare Treaties?)
No Comments | Posted by Mark A. Kochuk on Thu. February 13, 2014 8:00 AM
Categories: Customary International Law, Cyberwarfare, Symposium

Symposium Review: Moving the Law of Armed Conflict from Crossbows to Cyber Attacks

At ILJ's 2014 symposium, Professor Eric Talbot Jensen argued that weapons technologies have progressed faster than international law's ability to handle them.


Read More... (Symposium Review: Moving the Law of Armed Conflict from Crossbows to Cyber Attacks)
No Comments | Posted by Vineeth Shanker Hemavathi on Tue. February 11, 2014 8:00 AM
Categories: Customary International Law, Cyberwarfare, Symposium

Symposium Review: Sovereign Assumptions

NCILJ's 2014 symposium, "Emerging Issues in the Law of Armed Conflict and International Security,” reflected North Carolina's strong military ties and wide network of national security legal professionals. 


Read More... (Symposium Review: Sovereign Assumptions)
No Comments | Posted by William L. Thore (Logan) on Tue. February 11, 2014 8:00 AM
Categories: Customary International Law, Cyberwarfare, Symposium

Sneak Preview: Cyber Attacks and the Beginnings of a Cyber Treaty

The U.S. Navy Seals who killed Osama bin Laden were inside Pakistan for three and a half hours -- undetected. Was their stealth made possible by cyberwarfare? 


Read More... (Sneak Preview: Cyber Attacks and the Beginnings of a Cyber Treaty)
No Comments | Posted by Stephen A. Moore on Wed. October 30, 2013 8:00 AM
Categories: Anonymous, Cyberwarfare, Osama Bin Laden, Pakistan, Terrorism

An Unconventional Approach: Syria and Cyber Attacks

The U.S. has focused on Syria’s chemical weapons, but a Syria-based cyberattack on the New York Times has drawn less attention


Read More... (An Unconventional Approach: Syria and Cyber Attacks)
No Comments | Posted by Stephen A. Moore on Tue. October 8, 2013 8:00 AM
Categories: Cyberwarfare, Syria, U.N. Security Council

Moving Towards International Norms in Cyberwarfare

Secretary of Defense Leon Panetta warns that cyberwarfare poses alarming new threats to the United States.


Read More... (Moving Towards International Norms in Cyberwarfare)
No Comments | Posted by Brett M. Neve on Sun. March 24, 2013 11:06 PM
Categories: Cyberwarfare

Administrator Login

UNC School of Law | Van Hecke-Wettach Hall | 160 Ridge Road, CB #3380 | Chapel Hill, NC 27599-3380 | 919.962.5106


If you are seeing this, you are either using a non-graphical browser or Netscape 4.x (4.7, 4.8, etc.) and this page appears very plain. If you are using a 4.x version of Netscape, this site is fully functional but lacks styles and optimizations available in other browsers. For full functionality, please upgrade your browser to the latest version of Internet Explorer or Firefox.