Challenges pertaining to cyber war under international law

M. Watney
{"title":"Challenges pertaining to cyber war under international law","authors":"M. Watney","doi":"10.1109/CyberSec.2014.6913962","DOIUrl":null,"url":null,"abstract":"State-level intrusion in the cyberspace of another country seriously threatens a state's peace and security. Consequently many types of cyberspace intrusion are being referred to as cyber war with scant regard to the legal position under international law. This is but one of the challenges facing state-level cyber intrusion. The current rules of international law prohibit certain types of intrusion. However, international law does not define which intrusion fall within the prohibited category of intrusion nor when the threshold of intrusion is surpassed. International lawyers have to determine the type of intrusion and threshold on a case-by-case basis. The Tallinn Manual may serve as guideline in this assessment, but determination of the type of intrusion and attribution to a specific state is not easily established. The current rules of international law do not prohibit all intrusion which on statelevel may be highly invasive and destructive. Unrestrained cyber intrusion may result in cyberspace becoming a battle space in which state(s) with strong cyber abilities dominate cyberspace resulting in resentment and fear among other states. The latter may be prevented on an international level by involving all states on an equal and transparent manner in cyberspace governance.","PeriodicalId":383642,"journal":{"name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSec.2014.6913962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

State-level intrusion in the cyberspace of another country seriously threatens a state's peace and security. Consequently many types of cyberspace intrusion are being referred to as cyber war with scant regard to the legal position under international law. This is but one of the challenges facing state-level cyber intrusion. The current rules of international law prohibit certain types of intrusion. However, international law does not define which intrusion fall within the prohibited category of intrusion nor when the threshold of intrusion is surpassed. International lawyers have to determine the type of intrusion and threshold on a case-by-case basis. The Tallinn Manual may serve as guideline in this assessment, but determination of the type of intrusion and attribution to a specific state is not easily established. The current rules of international law do not prohibit all intrusion which on statelevel may be highly invasive and destructive. Unrestrained cyber intrusion may result in cyberspace becoming a battle space in which state(s) with strong cyber abilities dominate cyberspace resulting in resentment and fear among other states. The latter may be prevented on an international level by involving all states on an equal and transparent manner in cyberspace governance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
国际法下的网络战挑战
国家层面侵入他国网络空间,严重威胁本国的和平与安全。因此,许多类型的网络空间入侵被称为网络战争,很少考虑国际法下的法律地位。这只是国家级网络入侵面临的挑战之一。现行的国际法规则禁止某些类型的入侵。但是,国际法并没有规定哪些侵犯属于被禁止的侵犯范畴,也没有规定何时超过侵犯的门槛。国际律师必须根据具体情况确定入侵的类型和门槛。《塔林手册》可以作为这一评估的指导方针,但确定入侵的类型和归属于特定国家并不容易。目前的国际法规则并没有禁止所有在国家层面上可能具有高度侵入性和破坏性的入侵。无节制的网络入侵可能导致网络空间成为网络能力强的国家主导网络空间的战争空间,引发其他国家的怨恨和恐惧。通过让所有国家以平等和透明的方式参与网络空间治理,可以在国际层面上防止网络空间滥用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An approach for forensic investigation in Firefox OS Mobile forensic data acquisition in Firefox OS Challenges pertaining to cyber war under international law The importance of mandatory data breach notification to identity crime Modifying authentication techniques in mobile communication systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1