For its advocates, this approach is especially appropriate in situations in which no State is responsible for the malicious cyber operation in question. Consider a case in which a terrorist group situated in one State engages in cyber operations against another State, and the operations result in physical damage to hardware on the territory of the latter. Had the operations been conducted by a State, they would at least have violated the latter’s sovereignty (Rule 4). The first State takes all feasible measures to terminate the group’s cyber operations originating in its territory, in line
...more