Crossing the rubicon: identifying and responding to an armed cyber-attack

Nerea M. Cal
{"title":"Crossing the rubicon: identifying and responding to an armed cyber-attack","authors":"Nerea M. Cal","doi":"10.1109/CYCONUS.2016.7836612","DOIUrl":null,"url":null,"abstract":"Over the past decade, the securitization of cyber technologies has dramatically altered the landscape of war. Beyond the technical challenges of countering nefarious cyber activities in a globalized and interconnected world, this new domain generates equally complex questions with respect to the conduct of war, the implementation of international law, and how to adjudicate actions perpetrated by non-state actors. Though the US maintains that existing international law applies to warfare in cyberspace, implementing the traditional rules of armed conflict in this domain presents challenges due in part to the blurring of boundaries that complicate the question of sovereignty as well as attribution. Neither current international law nor United States defense policy has resolved the question of what classifies as an armed attack in cyber-space nor how to adjudicate attacks perpetrated by non-state actors. This paper will address the question of what constitutes an “armed attack” in cyberspace, and how - once it has attributed responsibility – the United States should respond to this type of warfare. Written with the presumption that the United States should lead efforts to shape international law in this field, this paper will briefly outline the set of international laws governing war, the challenges in applying them to cyber-warfare, and provide recommendations for how to apply the law of armed conflict in cyberspace. Specifically, it will advocate for an effectsbased definition of an armed attack that provides a legal avenue for the United States to respond to cyber-attacks perpetrated by non-state actors.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Cyber Conflict (CyCon U.S.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYCONUS.2016.7836612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Over the past decade, the securitization of cyber technologies has dramatically altered the landscape of war. Beyond the technical challenges of countering nefarious cyber activities in a globalized and interconnected world, this new domain generates equally complex questions with respect to the conduct of war, the implementation of international law, and how to adjudicate actions perpetrated by non-state actors. Though the US maintains that existing international law applies to warfare in cyberspace, implementing the traditional rules of armed conflict in this domain presents challenges due in part to the blurring of boundaries that complicate the question of sovereignty as well as attribution. Neither current international law nor United States defense policy has resolved the question of what classifies as an armed attack in cyber-space nor how to adjudicate attacks perpetrated by non-state actors. This paper will address the question of what constitutes an “armed attack” in cyberspace, and how - once it has attributed responsibility – the United States should respond to this type of warfare. Written with the presumption that the United States should lead efforts to shape international law in this field, this paper will briefly outline the set of international laws governing war, the challenges in applying them to cyber-warfare, and provide recommendations for how to apply the law of armed conflict in cyberspace. Specifically, it will advocate for an effectsbased definition of an armed attack that provides a legal avenue for the United States to respond to cyber-attacks perpetrated by non-state actors.
跨越卢比孔河:识别和应对武装网络攻击
在过去的十年中,网络技术的证券化极大地改变了战争的格局。除了在全球化和相互联系的世界中打击恶意网络活动的技术挑战之外,这个新领域还产生了关于战争行为、国际法实施以及如何裁决非国家行为者所犯行为的同样复杂的问题。尽管美国坚持认为现有的国际法适用于网络空间战争,但在这一领域实施传统的武装冲突规则面临挑战,部分原因是边界模糊,使主权和归属问题复杂化。目前的国际法和美国国防政策都没有解决网络空间武装攻击的分类问题,也没有解决如何裁决非国家行为者实施的攻击的问题。本文将讨论什么构成了网络空间中的“武装攻击”,以及一旦确定了责任,美国应该如何应对这种类型的战争。本文假定美国应带头努力塑造这一领域的国际法,本文将简要概述一套管理战争的国际法,将其应用于网络战的挑战,并就如何在网络空间应用武装冲突法提供建议。具体而言,它将倡导基于效果的武装攻击定义,为美国应对非国家行为者实施的网络攻击提供法律途径。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信