achanthaat July 12,2015 Some interesting points made by the comments above. I especially agree with @kkrishna in saying that cyberattacks are a slippery slope. It's extremely important to weigh the pros and cons before deciding that a cyber attack is the best solution against another nation. You definitely never know how the other will respond to the cyber attack.
arautat July 13,2015 Cyber laws are very complicated to write given the anonymity of the cyber attacks. So far all the cyber attacks has been to gain access to other nations data and sensitive information. Unless there is a physical damage to citizen of nation, No nation will be hard pressed to write cyber laws.
mrgodfrey3at July 15,2015 The video poses some interesting questions but doesn't seem to offer any answers.
pseagrenat July 17,2015 Cyberwar, as stated in the video is an evolving reality of the modern world. Unfortunately, before any nation can write things into law, the modus operandi changes as does the technology used behind the attacks. This creates many issues as “counter-attacks” and detection methods usually cannot keep up. It reminds me of the Silkroad issue, where there is a supply, there will always be a demand. Where people are willing to pay large amounts of money and resources for information, there will always be cybercrime. As technology evolves so will the crimes and the results. Maybe one day technology will slow down to the point that it is a little safer. In the meantime, I would think twice before purchasing wireless devices such as appliances, door locks, or a thermostat for your home since most of them have been hacked already. The last thing a person needs is to come home to find out their house caught on fire because your new super wireless stove overheated due to it being hacked :)
428Mach1at July 20,2015 Interesting questions posed by the video. Technology is always ahead of the laws; usually at least one step ahead. When I first got into data processing in the "dark ages", I had worked for a law firm. There was only one book in the law library dealing with "Computer Law" and it was simple and mostly theoretical - it defined the need for protections for intellectual property and similar topics. The use of the networked personal computer [an ancient term] in remotely committing financial crimes has exploded. Likewise, their utility as instruments of war has been recognized. Indeed, there is a specialized branch (a division ?) of China`s army that is tasked with hacking other nations` military and industrial sites [Mandiant report at http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf]. I lend less credence to the accountability aspect of cyberwar and more toward how we can stay ahead of our enemies - the targets are trade secrets at commercial concerns as well as our governmental and military website.