{"title":"Crossing the rubicon: identifying and responding to an armed cyber-attack","authors":"Nerea M. Cal","doi":"10.1109/CYCONUS.2016.7836612","DOIUrl":null,"url":null,"abstract":"Over the past decade, the securitization of cyber technologies has dramatically altered the landscape of war. Beyond the technical challenges of countering nefarious cyber activities in a globalized and interconnected world, this new domain generates equally complex questions with respect to the conduct of war, the implementation of international law, and how to adjudicate actions perpetrated by non-state actors. Though the US maintains that existing international law applies to warfare in cyberspace, implementing the traditional rules of armed conflict in this domain presents challenges due in part to the blurring of boundaries that complicate the question of sovereignty as well as attribution. Neither current international law nor United States defense policy has resolved the question of what classifies as an armed attack in cyber-space nor how to adjudicate attacks perpetrated by non-state actors. This paper will address the question of what constitutes an “armed attack” in cyberspace, and how - once it has attributed responsibility – the United States should respond to this type of warfare. Written with the presumption that the United States should lead efforts to shape international law in this field, this paper will briefly outline the set of international laws governing war, the challenges in applying them to cyber-warfare, and provide recommendations for how to apply the law of armed conflict in cyberspace. Specifically, it will advocate for an effectsbased definition of an armed attack that provides a legal avenue for the United States to respond to cyber-attacks perpetrated by non-state actors.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Cyber Conflict (CyCon U.S.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYCONUS.2016.7836612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Over the past decade, the securitization of cyber technologies has dramatically altered the landscape of war. Beyond the technical challenges of countering nefarious cyber activities in a globalized and interconnected world, this new domain generates equally complex questions with respect to the conduct of war, the implementation of international law, and how to adjudicate actions perpetrated by non-state actors. Though the US maintains that existing international law applies to warfare in cyberspace, implementing the traditional rules of armed conflict in this domain presents challenges due in part to the blurring of boundaries that complicate the question of sovereignty as well as attribution. Neither current international law nor United States defense policy has resolved the question of what classifies as an armed attack in cyber-space nor how to adjudicate attacks perpetrated by non-state actors. This paper will address the question of what constitutes an “armed attack” in cyberspace, and how - once it has attributed responsibility – the United States should respond to this type of warfare. Written with the presumption that the United States should lead efforts to shape international law in this field, this paper will briefly outline the set of international laws governing war, the challenges in applying them to cyber-warfare, and provide recommendations for how to apply the law of armed conflict in cyberspace. Specifically, it will advocate for an effectsbased definition of an armed attack that provides a legal avenue for the United States to respond to cyber-attacks perpetrated by non-state actors.