应对网络威胁:来自国际法的答案

Anna Rotondo
{"title":"应对网络威胁:来自国际法的答案","authors":"Anna Rotondo","doi":"10.1109/CYCONUS.2016.7836625","DOIUrl":null,"url":null,"abstract":"Cyber activities, particularly those of a cross-border nature, have not yet been subjected to international regulation despite the fact that cyberspace has become a strategic domain for all States. This lack puts at risk the efficacy of national defence strategies inasmuch as the decision maker remains inactive because assailed by the so-called response crises. That is the dilemma arising from the doubt that in case of a cyber threat, or cyber attack, any operative choice may lead to a violation of international law. In this scenario States are obliged to reconsider new defence strategies and theories of deterrence such as that of deterrence by denial, which is primarily based on the concept of resilience in order to reassure service continuity in the aftermath of destructive events, especially when they are unpredictable. In the silence of international law active defense strategies seem to be a sustainable legal-functional solution for the targeted State which does not wish to remain defenseless, but only if these strategies do not reach the threshold of unlawful conducts. However the reaction against in coming cyber attacks remains a tangled problem for the targeted State because if on the one hand the customary international law on direct responsibility is almost never applied, on the other hand the discipline of indirect responsibility doesn’t give any contribution to the decision maker who has to choose for a prompt option of reaction.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Countering cyber threats: answers from international law\",\"authors\":\"Anna Rotondo\",\"doi\":\"10.1109/CYCONUS.2016.7836625\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber activities, particularly those of a cross-border nature, have not yet been subjected to international regulation despite the fact that cyberspace has become a strategic domain for all States. This lack puts at risk the efficacy of national defence strategies inasmuch as the decision maker remains inactive because assailed by the so-called response crises. That is the dilemma arising from the doubt that in case of a cyber threat, or cyber attack, any operative choice may lead to a violation of international law. In this scenario States are obliged to reconsider new defence strategies and theories of deterrence such as that of deterrence by denial, which is primarily based on the concept of resilience in order to reassure service continuity in the aftermath of destructive events, especially when they are unpredictable. In the silence of international law active defense strategies seem to be a sustainable legal-functional solution for the targeted State which does not wish to remain defenseless, but only if these strategies do not reach the threshold of unlawful conducts. However the reaction against in coming cyber attacks remains a tangled problem for the targeted State because if on the one hand the customary international law on direct responsibility is almost never applied, on the other hand the discipline of indirect responsibility doesn’t give any contribution to the decision maker who has to choose for a prompt option of reaction.\",\"PeriodicalId\":358914,\"journal\":{\"name\":\"2016 International Conference on Cyber Conflict (CyCon U.S.)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Cyber Conflict (CyCon U.S.)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYCONUS.2016.7836625\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Cyber Conflict (CyCon U.S.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYCONUS.2016.7836625","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

尽管网络空间已成为所有国家的战略领域,但网络活动,特别是跨境网络活动尚未受到国际监管。这种缺乏使国防战略的效力受到威胁,因为决策者由于受到所谓的反应危机的攻击而仍然不活跃。在网络威胁或网络攻击的情况下,任何行动选择都可能导致违反国际法。在这种情况下,各国必须重新考虑新的防御战略和威慑理论,例如拒止威慑理论,拒止威慑理论主要基于复原力的概念,以便在破坏性事件,特别是不可预测事件发生后确保服务的连续性。在国际法沉默的情况下,积极防御战略似乎是不希望毫无防御能力的目标国家的一种可持续的、具有法律功能的解决办法,但前提是这些战略没有达到非法行为的门槛。然而,对即将到来的网络攻击的反应对于目标国家来说仍然是一个纠结的问题,因为一方面,关于直接责任的习惯国际法几乎从未适用过,另一方面,间接责任的纪律并没有给决策者提供任何帮助,他们必须选择一个迅速的反应选项。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Countering cyber threats: answers from international law
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to international regulation despite the fact that cyberspace has become a strategic domain for all States. This lack puts at risk the efficacy of national defence strategies inasmuch as the decision maker remains inactive because assailed by the so-called response crises. That is the dilemma arising from the doubt that in case of a cyber threat, or cyber attack, any operative choice may lead to a violation of international law. In this scenario States are obliged to reconsider new defence strategies and theories of deterrence such as that of deterrence by denial, which is primarily based on the concept of resilience in order to reassure service continuity in the aftermath of destructive events, especially when they are unpredictable. In the silence of international law active defense strategies seem to be a sustainable legal-functional solution for the targeted State which does not wish to remain defenseless, but only if these strategies do not reach the threshold of unlawful conducts. However the reaction against in coming cyber attacks remains a tangled problem for the targeted State because if on the one hand the customary international law on direct responsibility is almost never applied, on the other hand the discipline of indirect responsibility doesn’t give any contribution to the decision maker who has to choose for a prompt option of reaction.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
International cyber incident repository system: information sharing on a global scale Cyber norms for civilian nuclear power plants Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector Sovereignty in cyberspace: Balkanization or democratization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1