首页> 外文OA文献 >Offensive cyber: What are the possibilities of the use of offensive cyber as an offensive capability within the existing international legal framework?
【2h】

Offensive cyber: What are the possibilities of the use of offensive cyber as an offensive capability within the existing international legal framework?

机译:进攻性网络:在现有国际法律框架内使用进攻性网络作为进攻能力的可能性是什么?

摘要

Cyber is hot. Although the international community, scientists, military and NATO primarily focus on how to defend themselves against cyber attacks, this study mainly focuses on the offensive side of cyber. The thesis analyses the possibilities of the use of offensive cyber as acapability within the existing international legal framework. The thesis consists of two parts. The first part discusses what offensive cyber is and what its possibilities and capabilities are. Offensive use of cyber is new within modern warfare. Therefore it is important to describe and explain cyber attacks and offensive cyber operations thoroughly. In this part the definitions areset, and the base characteristics of cyber attack are discussed. Not only the possibilities of offensive cyber are described, but also dilemmas for the use of offensive cyber are explained.This first part concludes with possible scenarios for the use of offensive cyber operations. The second part of this thesis is a case study and analyses whether and how offensive cyber fits in, and complies with the existing international legal framework. Firstly, the aspects in the existing international legal framework are discussed, which are unambiguous for regular warscenarios, but seem difficult to interpret when it comes to cyber operations. Secondly, the case study is conducted by analysing the three main principles within the Laws of Armed Conflict (LoAC), proportionality, necessity and distinction, on the four recent cyber cases of Estonia2007, Georgia 2008, Stuxnet 2010 and Libya 2011. The conclusion of the thesis is that the existing international legal framework is not fully suitable for the use of cyber as an offensive capability. Especially the attribution problem, collateral damage, and distinction between military and civil objects are problematic. As long as there is no consensus on international accepted cyber law that sets the boundaries for the use of offensive cyber, the existing international legal framework is applicable, and the use of offensive cyber will have its challenges and grey areas. A new international accepted legal cyber frameworkshould limit, and set boundaries for the use of offensive cyber. On the other hand, developing a new international accepted legal framework, in which offensive cyber is appointed, is also an opportunity to exploit the optimum use of offensive cyber, within that framework.
机译:网络很热。尽管国际社会,科学家,军事人员和北约主要关注如何防御网络攻击,但本研究主要关注网络的进攻方面。本文分析了在现有国际法律框架内利用进攻性网络作为能力的可能性。论文分为两部分。第一部分讨论什么是进攻性网络,以及它的可能性和能力。在现代战争中,进攻性使用网络是新的。因此,全面描述和解释网络攻击和攻击性网络运营非常重要。在这一部分中,我们定义了定义,并讨论了网络攻击的基本特征。不仅描述了进攻性网络的可能性,而且还解释了使用进攻性网络的困境。第一部分总结了使用进攻性网络作战的可能方案。本文的第二部分是一个案例研究,分析了进攻性网络是否适合以及如何适应并符合现有的国际法律框架。首先,对现有国际法律框架中的各个方面进行了讨论,这些方面对于常规战争场景而言是明确的,但是在涉及网络运营时似乎很难解释。其次,通过分析爱沙尼亚2007年,格鲁吉亚2008年,Stuxnet 2010年和利比亚2011年的四个最新网络案例,分析了武装冲突法(LoAC)中的三个主要原则,相称性,必要性和区别性。本文认为,现有的国际法律框架并不完全适合将网络作为进攻手段。尤其是归因问题,附带损害以及军事和民用物体之间的区别是有问题的。只要在国际公认的网络法律上没有就使用攻击性网络设定界限达成共识,现有的国际法律框架就适用,并且使用攻击性网络将面临挑战和灰色地带。一个新的国际公认的法律网络框架应该加以限制,并为进攻性网络的使用设定界限。另一方面,制定一个新的国际公认的法律框架,任命进攻性网络,这也是在该框架内充分利用进攻性网络的机会。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号