architecture, Diplomacy

Cyberconflict and warfare

Stay up to date!

Subscribe to DiploNews and stay up to date with upcoming events, new publications and research, and Diplo courses and training.

From our blog

Who’s behind a cyberattack?

Anastasiya Kazakova

Unravelling cyberattacks through a simulation game A seemingly ordinary Monday. You enter your office, turn on your computer, and grab a cup of coffee. As you settle in your desk to check your emails and connect to t...

What’s new with cybersecurity negotiations? UN Cyber OEWG Final Report analysis

Pavlina Ittelson

The UN’s Open-ended Working Group (OEWG) on Developments in the Field of ICTs in the Context of International Security (UN Cyber OEWG) has established another landmark in the international negotiations about the ‘...

A new landmark in global cybersecurity negotiations: UN Cyber OEWG in numbers

Andrijana Gavrilović

Now that everyone’s morning news frequently feature cyberattacks that cause real damage to human health, safety, economic income and threaten nations’ political stability and elections; cybersecurity is finally ma...

New Year’s in New York: A Crowded Cyber-Norms Playground (Part 2)

Vladimir Radunović

One could say that the wish list for cyber-peace was already written in 2015, when states agreed on some rules of behaviour in cyberspace - including that existing international law applies to it. Are we good to go? N...

Training and courses

Events

Business-Policy Roundtable

02 Apr 19 25 Mar 19 -

Public International Law Day 2018

27 Nov 18 -

Switzerland

Resources

2018

Searching for Meaningful Human Control. The April 2018 Meeting on Lethal Autonomous Weapons Systems (Briefing Paper #10)

In this briefing paper, Ms Barbara Rosen Jacobson analyses the debate of the April 2018 meeting of the Group of Governmental Experts (GGE) of the Convention on Certain Conventional Weapons (CCW). The group was established to discuss emerging technologies in the area of... Read more...

web page, Diplomacy

1998

The waning of the state and the waxing of cyberworld

This paper discusses whether IT is functioning mainly as an instrument of states in their quest for power and wealth or is principally operating as a transformative agent by market forces and various sectors of civil society.... Read more...

, Line

2013

Peacetime Regime for State Activities in Cyberspace

The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the respective areas of... Read more...

Peacetime Regime for State Activities in Cyberspace