Cyber-attacks – an unlawful use of digital technologies

G. Shinkaretskaya, A. Berman
{"title":"Cyber-attacks – an unlawful use of digital technologies","authors":"G. Shinkaretskaya, A. Berman","doi":"10.25136/2644-5514.2022.1.37271","DOIUrl":null,"url":null,"abstract":"\n This article notes that cyber-attacks, i.e. disruption of the information systems of persons, companies or countries, are a new type of criminal activity. International law does not yet have does not have normative documents that regulate the procedure of countering cyber-attacks. It is complicated by the fact that in the international law the grounds for taking coercive measures against other country is aggression (armed attack), which confers the right to individual or collective self-defense of the country. It is indicated that the doctrine legitimizes drawing parallels between common operation that are classified as the resorting to force, and the corresponding cyber operations. As the criterion of aggression, it is offered to use the assessment of the scale of attack and severity of consequences. The difficulty in qualifying the cyber-attack also lies in open architecture of the Internet, which allows billions of users worldwide to interact with each other. The aforementioned aspect also allows the hackers to hide their identity or even use someone else's device without their knowledge. All these difficulties aggravate if cyber operations are conducted by or on behalf of the countries. In fact, the cyber-attack participants do not bear any consequences for their actions. It is claimed that modern international law suggests both, intraterritorial or extraterritorial jurisdiction.\n","PeriodicalId":284936,"journal":{"name":"Международное право","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Международное право","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25136/2644-5514.2022.1.37271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This article notes that cyber-attacks, i.e. disruption of the information systems of persons, companies or countries, are a new type of criminal activity. International law does not yet have does not have normative documents that regulate the procedure of countering cyber-attacks. It is complicated by the fact that in the international law the grounds for taking coercive measures against other country is aggression (armed attack), which confers the right to individual or collective self-defense of the country. It is indicated that the doctrine legitimizes drawing parallels between common operation that are classified as the resorting to force, and the corresponding cyber operations. As the criterion of aggression, it is offered to use the assessment of the scale of attack and severity of consequences. The difficulty in qualifying the cyber-attack also lies in open architecture of the Internet, which allows billions of users worldwide to interact with each other. The aforementioned aspect also allows the hackers to hide their identity or even use someone else's device without their knowledge. All these difficulties aggravate if cyber operations are conducted by or on behalf of the countries. In fact, the cyber-attack participants do not bear any consequences for their actions. It is claimed that modern international law suggests both, intraterritorial or extraterritorial jurisdiction.
网络攻击——非法使用数字技术
本文指出,网络攻击,即破坏个人、公司或国家的信息系统,是一种新型的犯罪活动。国际法目前还没有规范网络攻击程序的规范性文件。在国际法中,对其他国家采取强制措施的理由是侵略(武装攻击),这赋予了国家单独或集体自卫的权利,这一事实使情况更加复杂。文章指出,这一理论使将被归类为诉诸武力的普通行动与相应的网络行动相提并论合法化。作为侵略的判定标准,提出了使用攻击规模和后果严重程度的评价。判定网络攻击的难度还在于互联网的开放架构,它允许全球数十亿用户相互交流。上述方面也允许黑客隐藏自己的身份,甚至在他们不知情的情况下使用别人的设备。如果网络行动是由国家或代表国家进行的,所有这些困难都会加剧。事实上,网络攻击参与者不为自己的行为承担任何后果。有人声称,现代国际法既建议治外法权,也建议治内法权。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信