experts
Duncan B. Hollis
Nonresident Scholar, Technology and International Affairs Program

about

Duncan B. Hollis is no longer with the Carnegie Endowment for International Peace.

Duncan B. Hollis was a nonresident scholar at the Carnegie Endowment for International Peace and the James E. Beasley professor of law at Temple Law School, where he also serves as the associate dean for academic affairs. Professor Hollis’s research focuses on public international law, the law of treaties, interpretation, and global cybersecurity. He is the editor of the Oxford Guide to Treaties (Oxford University Press, 2012), which was awarded the 2013 ASIL Certificate of Merit for high technical craftsmanship and utility to practicing lawyers. His cyber-related research examines international law’s role in regulating cyberthreats, the construction of cybernorms, and the application of humanitarian principles to global cybersecurity. He is the author of An e-SOS for Cyberspace, 52 Harvard International Law Journal 374 (2011) and, together with Martha Finnemore, Constructing Cybernorms for Cybersecurity, 110 American Journal of International Law (forthcoming 2016). 

Previously, Professor Hollis served as an attorney-adviser in the Office of the Legal Adviser at the U.S. Department of State, where he participated in various bilateral and multilateral treaty negotiations as well as the litigation of two cases before the International Court of Justice.  He is a regular contributor and member of the Board of the premier international law blog, Opinio Juris. Professor Hollis is also an elected member of the American Law Institute and serves as an adviser on its project to draft a Fourth Restatement on the Foreign Relations Law of the United States.


education
Boston College Law School, J.D., summa cum laude, May 1996, The Fletcher School of Law & Diplomacy, M.A.L.D., May 1996, Bowdoin College, A.B., summa cum laude, Phi Beta Kappa, May 1992  
languages
English

All work from Duncan B. Hollis

filters
9 Results
In The Media
in the media
Cyberattack as Use of Force (Part 2)

In some ways Estonia, in 2007, was the starting point where it became a topic for real global attention.

· April 13, 2022
In The Media
in the media
Cyberattack as Use of Force

Professor Duncan Hollis of Temple Law explains the development of international cyberspace law, starting with the preliminary questions of whether and how existing international laws apply.

· April 13, 2022
REQUIRED IMAGE
In the Media
Oxford Statement on International Law Protections in Cyberspace: The Regulation of Ransomware Operations

In the past few months, nothing has reminded everyone of the etymology of the expression “computer virus” like ransomware. This form of malicious code is delivered through a vulnerability in the victim’s system, such as a phishing email or password spraying, infiltrating and potentially crippling it like a disease.

· October 4, 2021
Just Security
commentary
A Brief Primer on International Law and Cyberspace

As states give increased attention to the governance of cyberspace (the technical architecture that allows the global internet to function) and governance in cyberspace (how states, industry, and users may use this technology), the role of international law in the cyber context has gained increasing prominence.

· June 14, 2021
In The Media
in the media
Cyber Norms: Specialisation from Fragmentation?

What are the ‘rules of the road’ for cyberspace, and who sets them? The question has risen in prominence and priority as cyber threats have grown more severe. A lack of clarity about acceptable behavior enables destabilizing cyber activity.

· April 20, 2021
In The Media
in the media
What Would Happen If States Started Looking at Cyber Operations as a “Threat” to Use Force?

How are threats of force conveyed in cyberspace? When hackers compromised the SolarWinds Orion software in the spring of 2020, they trojanized the so-called Sunburst backdoor, a system designed to communicate with third-party providers.

· March 31, 2021
paper
Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads

As cyber threats multiply, efforts to establish international norms for cyber activity have created a disjointed ecosystem. Is the fragmentation a cause for concern or an opportunity to promote cyber stability and security?

  • +1
· February 26, 2020
event
Launch: Toward a Global Norm Against Manipulating the Integrity of Financial Data
June 19, 2017

The G20 should commit not to manipulate the integrity of data and algorithms of financial institutions and to cooperate when such incidents occur.

  • +2
event
Cyber Norms Revisited: International Cybersecurity and the Way Forward
February 6, 2017

An exploration of how international cyberspace norms evolve and work, and what more they could contribute to making cyberspace more hospitable.

  • +2