Document Type


Publication Date




Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the activities of political, military, or economic institutions, and at times to cause physical destruction or death.

Moreover, because these technologies allow the perpetrators to obscure their identities or the full effects of their operations, the people and institutions that are affected do not always have the relevant information to protect themselves from future attacks or to respond.


Internet Law | Law | Science and Technology Law


© 2021 The Authors. This article has been published in the Proceedings of the ASIL Annual Meeting and is free to view and download for private research and study only. Not for re-distribution or re-use.