Ido Kilovaty SJD, LLM

Frederic Dorwart Endowed Assistant Professor of Law College of Law
Curriculum Vitae [PDF]


Ido Kilovaty is the Frederic Dorwart Endowed Assistant Professor of Law. He comes to the College of Law after two years as a Research Scholar in Law at Yale Law School. At Yale, he was a Cyber Fellow at the Center for Global Legal Challenges, and a Resident Fellow at the Information Society Project, where he remains an affiliated fellow. Professor Kilovaty is also a 2018-19 Cybersecurity Policy Fellow at New America. He specializes in the intersection of technology, law, and society, with a focus on cybersecurity – both domestic and international. His specific areas of research include cybersecurity law, internet governance, and domestic and global technology regulation. His recently authored “Freedom to Hack” which proposes a solution of ethical hacking for the improvement of smart-device security is forthcoming in the Ohio State Law Journal and “Legally Cognizable Manipulation” which explores the relationship between novel breach-related harms and data-breach law is forthcoming in the Berkeley Technology Law Journal. His work has also appeared in the Harvard National Security Journal, Michigan Telecommunications and Technology Law Review, Duke Law & Technology Review, Columbia Science and Technology Law Review, and more. Professor Kilovaty’s op-eds and essays appeared at Harvard Law Review Blog, Lawfare, Just Security, WIRED, and TechCrunch.

SJD, Georgetown University Law Center
LL.M., University of California, Berkeley, School of Law
LL.B, Hebrew University of Jerusalem, Faculty of Law

International Law
Law and Technology
Law of War

International Law
Cybersecurity Law
Technology Law

The following may be selected publications rather than a comprehensive list.

Law Reviews

Freedom to Hack, Ohio State Law Journal (2019).

Doxfare – Politically Motivated Leaks and the Future of the Norm on Non - Intervention in the Era of Weaponized Information, 9 Harv. Nat'l. Sec. J. 146 (2018).

Virtual Violence - Disruptive Cyberspace Operations as "Attacks" under International Humanitarian Law, 22 Mich. Telecomm. & Tech. L. Rev. 113 (2016).

ICRC, NATO, and the U.S. - Direct Participation in "Hacktivities" - Targeting Private Contractors in Cyberspce Under the Law of Armed Conflict, 15 Duke L. & Tech. Rev. 1 (2016).

World Wide Web of Exploitations: The Case of Peacetime Cyber Espionage Operations Under International Law: Towards a Contextual Approach, 18 Columb. Sci. & Tech. L. Rev. 42 (2017).

Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter, 4 J. L. & Cyber War. 210( 2015).

Report of the Commission of Inquiry on Human Rights in the Democratic People's Republic of Korea: Green Light for Humanitarian Intervention?, 6 Creighton Int'l & Comp. L. J. 1 (2015).

Cyber Warfare and the Jus ad Bellum Challenges: Evaluation in Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare, 5 Am. U. Nat'l. Sec. Brief 91 (2014).

Legally Cognizable Manipulation, Berkeley Technology Law Journal (2019).

Conference Proceeding

Yale Cyber Leadership Forum: Bridging the Divide: The Law, Technology, and Business of Cyber Security – Conference Report, (July 31, 2018, co-editor with Oona Hathaway and Ted Wittenstein)


The Cambridge Analytica Debacle is Not a Facebook "Data Breach." Maybe It Should Be, TechCrunch (March 17, 2018).

Data Breach Through Social Engineering,, Har. L. Rev. Blog (March 21, 2018).

If it talks like a government and acts like a government, it must be a tech giant, TechCrunch, March 31, 2017.

Repealing Net Neutrality, National Security, and the Road to a Dictatorial Internet, Harv. L. Rev. Blog (December 22, 2017).

Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law, Just Security, March 3, 2017.

The World is on the Verge of a Cyber War, The Jerusalem Post (January 7, 2017).

The Equifax Aftermath – We Need More Hacking, Lawfare (October 6, 2017).

Want to Keep Hackers Out of Gadgets? Try International Law, (February 7, 2017).

The Double-Edged Sword of Vehicle Software Tinkering under the Digital Millennium Copyright Act Exemption, University of Haifa Cyber Forum Blog (December 4, 2016).

Thoughts on Apple's Refusal to Unlock San Bernardino Gunman's iPhone, University of Haifa Cyber Forum Blog (February 20, 2016)

Legal Blackout – Thoughts on Due-Diligence in Cyberspace and the Legality of Cyber-Espionage in the Aftermath of the Ukrainian Power Outage Cyber-Attack, University of Haifa Cyber Forum Blog (December 4, 2016).

Will "Cyber Bonds" Mitigate Transnational Cyberspace Threats, Just Security (June 15, 2016).

The Democratic National Committee Hack: Information as Interference, Just Security (August 1, 2016).

First of its Kind U.S. Indictment of Iranian Hackers - the Future of Cyber Accountability, University of Haifa Cyber Forum Blog (March 15, 2016).

Towards a Cyber-Security Treaty (with Itamar Mann, August 3, 2016).

Anonymous to Launch "Massive Cyber Attacks" Against ISIS in the Aftermath of the Paris Terrorist Attacks, University of Haifa Cyber Forum Blog (November 18, 2015).

"Sophisticated Cyberattack" against the Pentagon Demonstrates the Biggest Gaps in Inter-State Cyberspace Activities Regulation, University of Haifa Cyber Forum Blog (August 13, 2015).

"Balkanization" of the Internet as a Response to Cybersecurity Threats – a Viable Solution or a Serious Obstacle for the Future of the Net, University of Haifa Cyber Forum Blog (May 11, 2015).

The Cyber-Attack on U.S. Office of Personnel Management – What are the Challenges?, University of Haifa Cyber Forum Blog (July 9, 2015).

War: The Next Generation, Ha'Aretz (December 22, 2014).

LGBTI Asylum Seekers May Still Face Hardships in the EU, Despite Recent ECJ Decision Ruling in Favor of Gay Asylum Seekers, Berkeley Journal of International Law Online, Berkeley Travaux (December 16, 2013).

American Society of International Law