In part 2 of the interview with cyberlaw Professor Duncan Hollis, Hollis explains the standards proposed to assess whether a cyberattack amounts to a use of force and how states may respond when non-state actors engage in cyber operations. Prof. Hollis then goes on to discuss how states can obfuscate their actions by contracting out the work or by failing to crack down on cybercriminals who target certain nations. Finally, Hollis discusses influence operations and to what extent international laws and norms apply when influence operations do not involve traditional force.
(Credits: 0.5 General MCLE)
Deadly Force as Self Defense
Injustice by Forensics
Weaponization of Outer Space
A Mindful Lawyer – Combatting Lawyer Stress
War Crimes – Israel & Gaza
Model Minority & Associates
Dying Without a Will
SFFA v. Harvard
Why Law Firms Implode
Police Commands & Police Coercion
Inside the Shadow Docket
Economic Incentives for Diversity
Lady Justice
Regulating Crypto after FTX
God & Football after Bremerton
Recusal & the Bounds of Judicial Bias
WV v. EPA & the Major Questions Doctrine
Driverless Cars—A Shift in Risk
Gun Law after Bruen
Surrogates, Donors, & Same Sex Parental Rights
Create your
podcast in
minutes
It is Free
City Manager Unfiltered
Potencial Americano
The ASIC Podcast
The Chris Plante Show
Strict Scrutiny