Navigating Jus Ad Bellum in the Age of Cyber Warfare

被引:3
作者
Nguyen, Reese [1 ]
机构
[1] Keker & Van Nest LLP, San Francisco, CA 94111 USA
关键词
NETWORKS; FORCE; LAW;
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The last decade has witnessed the heightened destructive potential of cyber attacks; correspondingly, cyberspace has become the new battlefield for nation-states in conflict. Yet jus ad helium the body of international law governing legitimate use of force provides little guidance about the legality of a cyber attack or when such an attack becomes an act of war justifying resort to responsive force. This Comment provides a new analytical framework for addressing that question. It begins by clarifying definitional ambiguities in the literature on cyber attack, setting forth a definition that focuses on computer networks as the instruments, rather than objects, of attack. It examines the technical concepts and considerations that influence the use-of-force analysis and animate the evaluation of potential analytical frameworks. It then discusses the governing jus ad bellum standards and critiques the leading approaches to assessing cyber attacks under these standards. This Comment departs from the traditional and accepted models of inquiry, drawing on cyber security research to propose a framework centered on cyber-physical systems that addresses cyber attacks under the laws of just war.
引用
收藏
页码:1079 / 1129
页数:51
相关论文
共 145 条
[1]  
af Jochnick Chris, 1994, HARV INTL L J, V35, P52
[2]  
AFJOCHNICK C, 1994, HARVARD INT LAW J, V35, P49
[3]  
[Anonymous], 2010, ECONOMIST
[4]  
[Anonymous], 2009, BERKELEY J INT LAW, V27, P192
[5]  
[Anonymous], NEW YORK TIMES 1212
[6]  
[Anonymous], 2004, American University International Law Review
[7]  
[Anonymous], ISC DOMAIN SURVEY
[8]  
[Anonymous], 2013, WHAT IS THE DIFFEREN
[9]  
[Anonymous], COLUMBIA JTL
[10]  
[Anonymous], 2004, AM INT L REV