Ido Kilovaty

Ido KilovatyIdo KilovatyIdo Kilovaty
  • Home
  • About Me
  • Teaching
  • Research
  • Contact
  • More
    • Home
    • About Me
    • Teaching
    • Research
    • Contact

Ido Kilovaty

Ido KilovatyIdo KilovatyIdo Kilovaty
  • Home
  • About Me
  • Teaching
  • Research
  • Contact

Research

My main area of research is cybersecurity law, which includes specific areas such as regulation of data security, computer crime law, and the regulation of new technologies.


Some of my published research (see below) addressed the data security of oil and gas infrastructure, data breaches causing psychological harm in affected consumers, tech companies as global cybersecurity regulators, military cyber-attacks against databases, and the expansion of legally permissible security research.


My research appeared in the Houston Law Review, UC Irvine Law Review, Ohio State Law Journal, Tennessee Law Review, Loyola of Los Angeles Law Review, Harvard National Security Journal, Berkeley Law and Technology Journal, North Carolina Journal of Law and Technology, and more. 


My book chapters appeared in volumes published by Oxford University Press and Edward Elgar and my op-eds and essays appeared on The Hill, Harvard Law Review Blog, Lawfare, Just Security, WIRED, and TechCrunch.

Publications

  • Hacking Generative AI, 58 Loyola of Los Angeles Law Review (2025)
  • Cybersecuring the Pipeline, 60 Houston Law Review (2023)
  • Attacking Big Data as a Use of Force, in Big Data and Armed Conflict Legal Issues Above and Below the Armed Conflict Threshold (Laura Dickinson, Edward Berg eds., Oxford University Press) (2023)
  • Psychological Data Breach Harms, 23 North Carolina Journal of Law and Technology (2022)
  • Cyber Conflict and the Thresholds of War, in Is the International Legal Order Unraveling? (David Sloss ed., Oxford University Press) (2022)
  • Availability’s Law, 88 Tennessee Law Review (2021)
  • Cybersecurity Abroad: Election Interference and The Extraterritoriality of Human Rights Treaty Obligations in Cybersecurity Abroad: Election Interference and the Extraterritoriality of Human Rights Treaty Obligations (Jens Ohlin and Duncan Hollis eds., Oxford University Press) (2021)
  • The International Law of Cyber Intervention in Research Handbook on International Law and Cyberspace (Nicholas Tsagourias, Russell Buchan, eds., 2nd Edition, Edward Elgar) (2021)
  • Privatized Cybersecurity Law, 10 UC Irvine Law Review (2020) 
  • An Extraterritorial Human Right to Cybersecurity, 10 Notre Dame Journal of International & Comparative Law (2020)
  • Legally Cognizable Manipulation, 34 Berkeley Technology Law Journal (2019)
  • Freedom to Hack, 80 Ohio State Law Journal 455 (2019)
  • The Elephant in the Room: Coercion, 118 American Journal of International Law Unbound (2019)
  • Doxfare – Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information, 9 Harvard National Security Journal (2018)
  • World Wide Web of Exploitations: The Case of Peacetime Cyber Espionage Operations Under International Law: Towards a Contextual Approach, 18 Columbia Science and Technology Law Review 42 (2017)
  • Virtual Violence – Disruptive Cyberspace Operations as "Attacks" under International Humanitarian Law, 22 Michigan Telecommunications and Technology Review 113 (2017)
  • ICRC, NATO and the U.S. – Direct Participation in “Hacktivities” – Targeting Private Contractors in Cyberspace under the Law of Armed Conflict, 15 Duke Law and Technology Review 1 (2016)
  • Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter, 4(3) Journal of Law and Cyber Warfare (2015)
  • Cyber Warfare and the Jus ad Bellum Challenges: Evaluation in Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare, 5 National Security Brief 91 (2015)

Powered by