Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal information; or about cyber attacks that target critical infrastructure. The principal question raised by these fervent activities are rules of engagement and proportionality of defense – the operative limit of country that discovers an attack […]