3 research outputs found

    The Promise and Limits of Cyber Power in International Law: Remarks

    Get PDF
    Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the activities of political, military, or economic institutions, and at times to cause physical destruction or death. Moreover, because these technologies allow the perpetrators to obscure their identities or the full effects of their operations, the people and institutions that are affected do not always have the relevant information to protect themselves from future attacks or to respond

    Autonomous cyber capabilities under international law

    No full text

    The Promise and Limits of Cyber Power in International Law: Remarks

    No full text
    Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the activities of political, military, or economic institutions, and at times to cause physical destruction or death. Moreover, because these technologies allow the perpetrators to obscure their identities or the full effects of their operations, the people and institutions that are affected do not always have the relevant information to protect themselves from future attacks or to respond
    corecore