Complete video at: http://fora.tv/2010/03/26/War_and_Law_in_Cyberspace Computer scientist Herb Lin distinguishes between two categories of hostile cyber operations: cyber attack, and cyber exploitation. A cyber attack, he says, is perpetrated to "destroy, degrade, disrupt" an adversary's information technology, while cyber exploitation is an act of stealthy information theft. ----- Do the existing laws of war deal adequately, if at all, with war in cyberspace? The panel will explore this and related questions, assessing how existing international law translates into war in cyberspace and what, if any, adjustments might be required to accommodate the new realities of war in an information age. Moderator: Duncan Hollis, Temple University School of Law Panelists: Jack Beard, University of California-Los Angeles, School of Law Eliana Davidson, U.S. Department of Defense, Office of the General Counsel Knut Doermann, International Committee of the Red Cross Robin Geiss, International Committee of the Red Cross Herb Lin, National Research Council of the National Academies Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.
Questions about Digital Espionage: Cyber Attacks vs Exploitation
Want more info about Digital Espionage: Cyber Attacks vs Exploitation?
Get free advice from education experts and Noodle community members.