2010
DOI: 10.1163/18757413-90000050
|View full text |Cite
|
Sign up to set email alerts
|

World Wide Warfare – Jus ad bellum and the Use of Cyber Force

Abstract: I am grateful to Barbara Sonczyk for her research assistance and to Matt Evans for explaining to me the intricacies of cyber technologies. All errors are of course mine. This article is based on developments as of June 2010. 2 "Cyberspace" is defined in the United States National Military Strategy for Cyberspace Operations as "a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures" (Unit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(9 citation statements)
references
References 2 publications
(2 reference statements)
0
8
0
1
Order By: Relevance
“…The goal of cyber exploitation is to obtain information from a computer network without the user's knowledge, which amounts to a modern form of espionage. Espionage is illegal under the domestic laws of most nations, but it is not illegal under international law (Roscini, 2010).…”
Section: Defining Cyber Warfarementioning
confidence: 99%
“…The goal of cyber exploitation is to obtain information from a computer network without the user's knowledge, which amounts to a modern form of espionage. Espionage is illegal under the domestic laws of most nations, but it is not illegal under international law (Roscini, 2010).…”
Section: Defining Cyber Warfarementioning
confidence: 99%
“…40 Leuprecht, Szeman, and Skillcorn, supra note 1: 390. 41 John B. Sheldon, "The Rise of Cyberpower": 309; in: John Baylis, James J Wirtz, and Colin S Gray, eds., Strategy in Contemporary World (Oxford and New York: Oxford University Press, 2013). 42 Rid and McBurney, supra note 29: 6.…”
Section: Cyberspace and Cyber Weaponsmentioning
confidence: 99%
“…After all, it must also be kept in mind that "an attacker must succeed only once, while a defender must always succeed" 40. This is combined with a low entry cost, since the knowledge for exploiting cyberspace is rather cheaply and readily available 41. However, there is a caveat: wide proliferation and low cost only…”
mentioning
confidence: 99%
“…Leaving aside the first case, scholars have debated over the past years whether scenarios (ii) and (iii) make sense in the case of cyber attacks (Roscini 2010;Schmitt 2011;Waxman 2011;etc.). The discussion has correspondingly revolved around whether a non-destructive cyber operation can amount to an un/lawful use of force (scenario ii), much as whether a cyber attack can rise to the level of an armed attack (scenario iii).…”
Section: The Use Of Force In International Lawmentioning
confidence: 99%