首页> 外文会议>International Conference on Cyber Conflict >Crossing the rubicon: identifying and responding to an armed cyber-attack
【24h】

Crossing the rubicon: identifying and responding to an armed cyber-attack

机译:跨越难题:识别和应对武装网络攻击

获取原文

摘要

Over the past decade, the securitization of cyber technologies has dramatically altered the landscape of war. Beyond the technical challenges of countering nefarious cyber activities in a globalized and interconnected world, this new domain generates equally complex questions with respect to the conduct of war, the implementation of international law, and how to adjudicate actions perpetrated by non-state actors. Though the US maintains that existing international law applies to warfare in cyberspace, implementing the traditional rules of armed conflict in this domain presents challenges due in part to the blurring of boundaries that complicate the question of sovereignty as well as attribution. Neither current international law nor United States defense policy has resolved the question of what classifies as an armed attack in cyber-space nor how to adjudicate attacks perpetrated by non-state actors. This paper will address the question of what constitutes an “armed attack” in cyberspace, and how - once it has attributed responsibility - the United States should respond to this type of warfare. Written with the presumption that the United States should lead efforts to shape international law in this field, this paper will briefly outline the set of international laws governing war, the challenges in applying them to cyber-warfare, and provide recommendations for how to apply the law of armed conflict in cyberspace. Specifically, it will advocate for an effects-based definition of an armed attack that provides a legal avenue for the United States to respond to cyber-attacks perpetrated by non-state actors.
机译:在过去的十年中,网络技术的证券化极大地改变了战争的格局。除了在全球化和相互联系的世界中应对邪恶的网络活动所面临的技术挑战之外,这个新领域在战争行为,国际法的执行以及如何裁定非国家行为者的行为方面也产生了同样复杂的问题。尽管美国坚持认为现有的国际法适用于网络空间的战争,但在这一领域实施武装冲突的传统规则仍带来挑战,部分原因是边界的模糊使主权和归属问题变得复杂。当前的国际法和美国的国防政策都没有解决以下问题:什么被归类为网络空间的武装攻击,还是如何裁定非国家行为者进行的攻击。本文将解决以下问题:什么构成了网络空间中的“武装攻击”,以及一旦确定了责任,美国应如何应对此类战争。假定美国应领导在这一领域制定国际法的努力,本文将简要概述有关战争的国际法的集合,将其应用于网络战争的挑战,并为如何应用网络法提供建议。网络空间武装冲突法。具体来说,它将倡导基于效果的武装攻击定义,为美国应对非国家行为者实施的网络攻击提供法律途径。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号