
Sign up to save your podcasts
Or
In part 2 of the interview with cyberlaw Professor Duncan Hollis, Hollis explains the standards proposed to assess whether a cyberattack amounts to a use of force and how states may respond when non-state actors engage in cyber operations. Prof. Hollis then goes on to discuss how states can obfuscate their actions by contracting out the work or by failing to crack down on cybercriminals who target certain nations. Finally, Hollis discusses influence operations and to what extent international laws and norms apply when influence operations do not involve traditional force.
(Credits: 0.5 General MCLE)
4.9
1818 ratings
In part 2 of the interview with cyberlaw Professor Duncan Hollis, Hollis explains the standards proposed to assess whether a cyberattack amounts to a use of force and how states may respond when non-state actors engage in cyber operations. Prof. Hollis then goes on to discuss how states can obfuscate their actions by contracting out the work or by failing to crack down on cybercriminals who target certain nations. Finally, Hollis discusses influence operations and to what extent international laws and norms apply when influence operations do not involve traditional force.
(Credits: 0.5 General MCLE)
90,603 Listeners
8,940 Listeners
86,142 Listeners
110,932 Listeners
55,862 Listeners
68,726 Listeners
8,007 Listeners
15,333 Listeners
33 Listeners
6,321 Listeners