Abstract
In the near absence of a specific "cyber-treaty", it has often been suggested that existing rules -- e.g. sovereignty, the UN Charter, human rights or the laws of war -- may apply to cyber-operations. The objective of this course consists in revisiting these arguments and modes of interpretation, to determine if there is any certainty regarding the regulation of cyber-threats.