2000
DOI: 10.1093/survival/42.3.89
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-attacks and international law

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…If they permit efficient national and global monitoring and control of critical infrastructures, they also multiply the points of entry through which hostile partiesbe they anarchist "hackers", transnational terrorists, or hostile states -can attack them. Moreover, "cyberattacks" circumvent many of the logistical challenges of traditional armed conflict: computer viruses like the, I Love You" and "Mother's Day" strains that infected millions of computers world-wide in early 2000 require no airlift or sealift capability [16].…”
Section: Future Conflictsmentioning
confidence: 99%
“…If they permit efficient national and global monitoring and control of critical infrastructures, they also multiply the points of entry through which hostile partiesbe they anarchist "hackers", transnational terrorists, or hostile states -can attack them. Moreover, "cyberattacks" circumvent many of the logistical challenges of traditional armed conflict: computer viruses like the, I Love You" and "Mother's Day" strains that infected millions of computers world-wide in early 2000 require no airlift or sealift capability [16].…”
Section: Future Conflictsmentioning
confidence: 99%
“…Regulation of cyber activities on a worldwide level would seem to be implementable (cf. Grove et al, 2000).…”
Section: Political / Regulatory Infrastructurementioning
confidence: 99%
“…According to one analysis, "Factors that may influence whether something is an act of force include expected lethality, destructiveness and invasiveness." 61 Thus, Article 41 may be interpreted as allowing some interruption of communications, if it is not done in a manner that is not lethal, destructive or invasive, but what does that mean in the cyber sense? Certainly, some acts against communication systems could be considered quite destructive and/or invasive, such as the manipulation of dam controls or power grids.…”
Section: As Noted By Cert/cc's Howard Lipsonmentioning
confidence: 99%
“…Possible pre -emptive actions must be also be considered and under what circumstances these might be allowed. 66 Elaborating upon this nutshell-identification of problems, Andrey Krutskikh, reflecting a general line of thinking among Russian experts, has made a number of suggestions for further international law work that would aim at including cyberattacks more broadly into extant international law. They can be summarized as follows:…”
Section: As Noted By Cert/cc's Howard Lipsonmentioning
confidence: 99%