<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>Cyber Operations and the U.S. Definition of &#x201C;Armed Attack&#x201D; - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="N1um5ceh9P"&gt;&lt;a href="https://www.justsecurity.org/53495/cyber-operations-u-s-definition-armed-attack/"&gt;Cyber Operations and the U.S. Definition of &#x201C;Armed Attack&#x201D;&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/53495/cyber-operations-u-s-definition-armed-attack/embed/#?secret=N1um5ceh9P" width="600" height="338" title="&#x201C;Cyber Operations and the U.S. Definition of &#x201C;Armed Attack&#x201D;&#x201D; &#x2014; Just Security" data-secret="N1um5ceh9P" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2018/03/GettyImages-466108394.jpg?fit=3000%2C1447&amp;ssl=1</thumbnail_url><thumbnail_width>3000</thumbnail_width><thumbnail_height>1447</thumbnail_height><description>[Ed. Note: Based on Goodman's remarks at U.S. Cyber Command&#x2019;s Annual Legal Conference.]  A widely accepted view of the UN Charter is that a State can use force in self-defense only in response to an &#x201C;armed attack,&#x201D; which is importantly defined as the gravest forms of force in scale and effects. In contrast, the United States has long maintained that a State can use force in self-defense in response to any amount of force by another State. The U.S. view might have worked well when it came to bombs and battleships. There are reasons, however, to think that the application of the U.S. view in the cyber realm may risk unintended, accidental, and unnecessary militarized conflicts.</description></oembed>
