
Sign up to save your podcasts
Or


In part 2 of the interview with cyberlaw Professor Duncan Hollis, Hollis explains the standards proposed to assess whether a cyberattack amounts to a use of force and how states may respond when non-state actors engage in cyber operations. Prof. Hollis then goes on to discuss how states can obfuscate their actions by contracting out the work or by failing to crack down on cybercriminals who target certain nations. Finally, Hollis discusses influence operations and to what extent international laws and norms apply when influence operations do not involve traditional force.
(Credits: 0.5 General MCLE)
By TalksOnLaw4.9
1818 ratings
In part 2 of the interview with cyberlaw Professor Duncan Hollis, Hollis explains the standards proposed to assess whether a cyberattack amounts to a use of force and how states may respond when non-state actors engage in cyber operations. Prof. Hollis then goes on to discuss how states can obfuscate their actions by contracting out the work or by failing to crack down on cybercriminals who target certain nations. Finally, Hollis discusses influence operations and to what extent international laws and norms apply when influence operations do not involve traditional force.
(Credits: 0.5 General MCLE)

87,722 Listeners

112,946 Listeners

6,444 Listeners

3,888 Listeners

16,095 Listeners