Cyber Attack and Non-State Actors in Ad Bellum
Words: 9625
Pages: 35
2
2
DownloadCyber Attack and Non-State Actors in Ad Bellum
I want to give a declaration that the thesis is my original work and all the ideas reflected here are my original proposals and things that have never been submitted anywhere to award the certificates or for the degree. In case some ideas are foreign or those that have been borrowed from other authors and researchers, they have been duly cited at the authors have been given the best credit that is due. I also want to declare that this work also adheres to all the academic requirements especially those that are concerned with the demands of academic standards.
I would like to dedicate this work to several people army who have suffered at the hands of cyber threats. I a dedicating this work to the people who have struggled at the hands of the poor laws that have not addressed the problem of cyber attack. These people have lost their close relatives and friends, this work is dedicated to you, and I am hoping that the work will be of help to society to move forward in finding ways to deal with the cyber-attack at the international level. I also wish those who have struggled to find out the rules that are necessary to implement against cyber-attacks. I don’t want to dedicate this work to my supervisor who has shown me the right procedures to do at the cyber-attack at international level and the role of non-state actors in international law especially those dealing with cyber attacks.
AcknowledgmentI want to give a shout an acknowledgement to the following people and organizations that have shown me the support and guidance that is necessary for me to focus on this basis completely.
Wait! Cyber Attack and Non-State Actors in Ad Bellum paper is just an example!
O start with, I want to give thanks to the Lord God for giving me all the power and strength required for me to conduct this research for the disease in a perfect way. Without God’s guidance, it would not have been possible for me to complete this thesis successfully. I am grateful for the power and strength that he has shown me throughout these places. Secondly, I want to pass my regards to the institutions that have approved the proposal and allowed me to conduct the places that I enjoy the most. I have always been fascinated by the laws that guide cyber operations at the international level. I want to pass my appreciation to you for approving my work and accepting my operation in this thesis. I want to thank my supervisor who is giving me the necessary guidance through or businesses. Additionally, I want to thank my fellow students and siblings who have seen with me throughout their work and giving me the necessary assistance needed for me to complete this process.
Thank you, and God bless you.
ABSTRACTIt is always difficult for states to have a strategic response to a cyber-attack. In this research, the thesis question is what does estate do strategically to respond to a cyber attack? This thesis aims to determine the responses that a state can have in case they have been attacked by a cyber attack and how these responses can affect the international relationship between two countries. Cyber security and other cyber issues do not have laws or theories that guide countries on how to act in case of a cyber attack. It is this reason that countries fail to understand what the terms of the mainstream theories at the level of international relations. To provide a framework for analyzing these issues, it is crucial to understand theories of defensive realism, constructivism as well as liberalism that shows how a state should respond to attacks. The suits have been focusing mainly on defending themselves against cyber attacks, especially when relating these attacks to the armed attacks. This thesis will explore the ideas behind the role of nonstate organizations and when a country can act in case of a cyber attack.
Keywords: Cyber attack, cyber security, defense, international relationships, and attack, cyberspace.
INTRODUCTION
This thesis is about Cyber attack and non-state actors in Ad Bellum, which has created debates despite the potential of disrupting the international peace and security. The lack of specific international legal structures that can be used when analyzing cyber attacks makes Cyber attack and non-state actors in Ad Bellum an idea that is fascinating to many people. International law states response for cyber attacks in self-defense are not defined in a better and a clear manner. Even though the law of war is well known and is widely accepted, determining when to apply cybercifibre responses as remains difficult. The difficulty comes because the laws are always covering the convention of War Between the States. In modern society, cyber attacks and cybercrimes have been difficult subjects to debate about because of the unsettlement and uncertainties surrounding the tropics. Cyber attacks are quite different from the well-known warfare especially the one that is done on the ground. These attacks what are permitted different as the involve network connections that is different from the armed attacks. A cyber attack can be defined as an action that is taken to undermine the existing functionality of the computer systems within the national security of a country. The attacks also go beyond the jurisdictions that are set on land. They are attacks that are meant to interfere with the political system or a stable economic system for the people behind the attack to gain financially. In most cases, cyber attacks are also targeting people who are living under technological advancement to prevent them from proceeding with asthmatic can also lead to massive destruction especially if it is meant to control a missile bomb. The development of cyberspace and the internet revolution started in the year 1980 through to the year 1990. This development has also shown potential avenues for war in a different dimension to the ones that the people are conventionally used to. The cyber-attack takes place when there are hostile actions and malicious event that have a political or economic motive. Cyberspace realism is complicated because of their modeling that exists between criminal warfare activities and different military responsibilities.
CHAPTER ONE:REMEDIES WHEN CYBER ATTACKS DO NOT REACH THE LEVEL OF AN ARMED ATTACK FROM NON STATE AND STATE ACTORS.One of the most significant debate about how being emotional and what it says about cyber-attack and when to use that defense. This dilemma creates several technical issues such as the cyber warfare. Having a basic fundamental knowledge of the law that relates to can help the countries manage a situation of cyber attack. There’s always a problem such a dealing with cyber-attack as the current interpretation of the law of war that omits this crucial issue. There are challenges that states face with the frameworks that are available. The states of the right response against the host state even if these responses are not justified. The result of the potentials that can be caused by cyber-attacks. A proposal to use active defenses have always been brought up from there state and non-state actors it is always for such states to try and utilize the best and the active forms of defense. The active defense will improve the state cyber defense and also follow the survival techniques because the orchestrators of the attack are always weary for being counted.
The most significant treaties for this disease is one that is stated within the united nations charter recognizing the rights and sovereignty of countries and also how countries should deal with the war against each other. The United nation’s charter also gives a representation of how countries should not be attacked by others and less they have been coerced and allowed by the United Nations to do so. The UN Security Council is responsible for all the security ideas especially those that deal with humanitarian interventions in a country. Establishing customary international law as one that is legally binding is an opinion of opiniojurisn which is a statement of security practice between countries. Various teleological interpretations are recognized at an international level as they relate to the United Nations charter. The main problem that has been realized is the lack of internet and cyber-attack laws drafted within the UN charter. Hence, it is never right to always start to the UN charter to get an analysis of the legal problems and to find solutions for the cyber warfare. Establishing international laws requires a legal binding and opinions that can be accepted by most countries. When it comes to the laws that are international and customary that covers the attacks of the internet, they are not provided but employed making the international laws that relate to the customary legislations to become quite relevant when examining cyber attacks. Similarly, judicial decisions that concern cyber attack has always supported different arguments made. The decision of the criminal justice only binds when the parties r respecting each other. Non-state actors refer to individuals or groups holding a massive influence on the government operations that can be whole or part of an independent state government. The interest and influence of the non-state actors can be broad; most of them being business magnets, media organizations or aid agencies. The rationale for focusing on non-state actors have always been the subject of public criticism and professional analysis. Non-states have been deployed differently due to abilities to perform offensive actions during a cyber-war crime. Various operations have taken place during these attacks. Apart from this, other hostile actions have shifted their operations in favor of nonstate actors as most of them become sustainable in fighting cyber-attacks. The complications when these non-state actors are also involved in criminal activities are also seen in different forms and platforms. Cyber-attacks mainly constitute the modern cyberspace warfare because the non-state actors mainly execute their actions after a connection. Because of the complications and the continuous changes, there is various involvement in cyber-attacks. Various states and non-state actors are always part of cyber warfare. The non-state actors perform cyber-attacks and are also part of the solutions to these problems while being less accountable for the actions. The lack of accountability is also created by the limitations of the international laws and limitations of individual state military doctrines and policies. The doctrines have to be followed to the latter. Due to the differences that a cyber-attack have concurring with the armed attack as it is always difficult to find the laws and jurisdictions behind cyber-attacks and how to react to achieve justice. The strength of the main nonstate actors has been increasing as technological advancement also proceeds. International community together with the current state cyber powers also have to adjust their security doctrine and enact considerable changes within the international bodies and laws to regulate the use of cybercrimes and interstate conflicts. States must, therefore, pursue methods that are multilateral so that they can prepare for threats presented by cyber realm by non-state actors. This work with look at some of the remedies that countries can take in case a cyber-attack reaches the level of an armed attack; it will explore some of the measures available for the states when they are responding to attacks. In many cases, the first attempt that has been proposed for countries to the resolver to in case of a cyber-attack is why identify the type of attack that they have experienced. In most cases, countries experience a complete shutdown and interference of the basic processes such as air control systems, transport systems or network systems.it is best for a country to trace the locations where the threat had originated from.
Cyberspace refers to a virtual environment that operates on a global scale affecting different networks and systems directly or indirectly thereby having an impact on the structures that are critical in modern society. These cyber actions involve a host of activities that take place within the cyberspace and a framework of illegal actions carried out by the nonstate actors rather than the state actors. In most cases, the actions are meant to disrupt and to harm a political system or a stable economic system so that the perpetrator can have personal gains and satisfaction.Contrary to the military or armed operations that are done primarily by state actors to accomplish a task, cyber-attacks cause harm and damage and sometimes resulting to a loss of life for accomplishing an economic or a personal objective. With many countries having a conflict with one another, cybercrimes provide different non-state actors an opportunity to attack other countries even without getting involved in the actions physically. Nonstate actors also come in different forms and sizes as well as different ideologies, motivations, and ability. There are times that the nonstate actors can cause harm on a state or take part in an operation that can help a country. This comes in the form of white hat hackers who are activists against terrorism and criminal activities.Cyber warfare refers to the use of computer systems and online controls to start warfare in a battle space thereby controlling the networks. It involves an offensive or defensive operation that pertains to attack a cybercrime. It can also involve espionage or sabotage. There have been numerous controversies surrounding operations of cybercrime and weather events that are not noted. Different powers have been on the ascendance with capabilities of cybercrime engaging in the warfare between different places such as UK, Israel, Russia, and us. Two of the most notable players of cybercrime include Iran and North Korea. The destruction capabilities have also been seen to grow with more independent network systems functioning on a daily basis. This distraction prospect is always expanding, and efforts to deal with the state terrorists and nonstate actor remain a massive concerned. The non-state actors have remained groups of ideal novelty because of their subversions and their less understood tenants within the Westphalia system.
One of the issues that have been debated recently is about the international laws that apply while responding to cyber-attacks within the self-defense priorities. Even though the law of war is well-known based on accepted principles that similar principles to cyber-attacks always been a difficult task. The difficulty also comes because these laws are developed from war and in many cases respond to traditional or conventional wars that take place between states. Whenever there are attacks within that similar paradigm, it becomes natural in assessing the scope and to identify the attack. However, the cyber-attack becomes difficult for states in assessing the scope and finding out who is responsible for the attack. It is these difficulties that make states to become quite reluctant in responding to cyber-attacks especially when there is then for the self-defense mechanism due to the fear of violation of the war laws. It turns out that cyber warfare is a hot topic within international law. It is always crucial to view and respond to cyber-attacks and to determine whether to act regarding war-hosts only is a criminal activity that presents a massive challenge. Using active defense against computer networks in different states is also a challenge within various borders.
Because of the potential catastrophes and consequences that may result from a cyber-attack, it is always imperative for various states to effectively defend the infractions of attack. The most effective method that is used is warding off a cyber-attack by using a layered defense or using both active and passive defenses. It is unfortunate that states usually choose to confine to the differences in computer technology in a manner that it conspires the passive defense alone as these countries do not want to violate the law of war. Currently, there are no comprehensive treaties that exist at the international level regarding the regulation of cyber-attacks. As a consequence of this, different states have to settle these issues by analogy; thereby equating the cyber-attacks to the armed warfare between different states. This way, they will correspond to the methods that they use at the law of war or equating them to the criminal activities that take place in the domestic criminal law. The existing views of legal scholars and states are based on the fact that states have to treat cyber-attacks similarly to criminal matters because they are uncertain over whether this cyber-attacks can be equated to the armed attack or not. The other reason is that of the law of war that needs states to attribute any form of armed attack to an intervention of foreign government or agents before they can respond to such a force .As a result of the challenges that are usually presented by the technical aspect of the cyber warfare, having basic knowledge in understanding the law of war about the cyber war is crucial in understanding the sound legal basis of the states and how to respond to cyber-attacks in self-defense. There is also a need for understanding the individual legal basis that comes with criminal citations and factual research.
The limited view in which people see the law of war is problematic because of two different reasons. The first reason is that active defense can be seen in the form of an electronic force and most cases concern the state computer defenses that are passive. This weakens the state posture of defense. The other dilemma is that it forces states to rely on the domestic criminal legislation that prevents cyber-attacks heavily. The domestic laws are ineffective because different states are also not willing to extradite or to prosecute cyber. These problems that come with the law of war makes different states to always find themselves in a condition where they only correspond to the crisis in case of an attack. It is also crucial when they are forced to decide between effective methods which may sometimes be illegal. Sometimes active defenses are effective but are less illegal. The attributions that are required perpetrates response to the crisis. Although countries can trace the cyber-attack by using technologies back to the computer servers, finding the identities in an intensive investigation, an idea that is quite a time to consume that also needs attention and assistance from the state where the original attack came from. Because of the prohibitions that exist to responding to a force, as well as the facts that majority of cyber attacks can come from non-state actors who are always reluctant to trace a cyber-attack to the origin because of the risk of violation of international laws. This means that states are always locked in the state of responding to the crisis instead of protecting itself against the attacks. Treating cyber-attack as a criminal matter can sometimes be less problematic in case a passive defense under criminal during jurisdiction gives sufficient protection for them. It is unfortunate that perceived offenses that reduces the chance of a successful cyber-attack. The defense also does little to attackers that are tempting and attack in the first place. Criminal laws are proven to be important as they did a massive part of the international cybercrimes as major state actions such as China and Russia to allow these attackers to operate in a manner that is immune from the rival states. Cybercrime has been the major cause of increasing terrorism around the globe with numerous countries suffering in the hands of people who have their agendas and objectives. Cyberspace operations are different from cyber war in that they can be in motivated by good objectives.
CHAPTER TWO:UNIQUE CHARACTERISTICS OF CYBER ATTACKSCyber-attacks refers to an umbrella that compass all the activities of non-state actors and nation-state actors within the cyberspace, sometimes considered to be hostile and those that cause harm and damage. Cyber war is loosely used to apply to instances that takes place when a cyber-attack occurs or a cyber-action operation that is surpassing the threshold recognized by the international community. When a cyber-war takes place, it surpasses the recognized welfare that is defined by the international law and sometimes leads to the loss of lives of the people. Cyber-attacks have special characteristics that are different from physical attacks. Unlike physical space, the cyberspace is a landscape that is human-made and has interconnection of devices. It requires a data connection which is provided by the internet. This means that the laws of one country cannot apply across all the geographical locations where the internet is present. It is these special characteristics that make cyber-attack a challenge together with the lack of goFrance that connected businesses and government agencies have to face. For many years, tools have enabled people with little computer knowledge to be able to prevent various controls world to start these attacks. The art is available to both the white hat hackers and black hat hackers for free such as vital hacking tools that they can use to penetrate different tester. The cyberspace itself is a world that lacks governance and control. Cyber-attacks expose perimeters and internal systems to a wide variety of threats. This makes it quite different from the physical war and traditional wars that people have been conventional too. One of the challenges is the rapid pace of change on the cyber-attack that presents a potential vulnerability. Management and control vigilance is needed to challenge the threat of the landscape presented by the cyber-attacks. Cyber-attacks are also rapidly reducing in price and the scale of use. Because of the low cost of the attacks, various attackers be presented to a state including those who cannot afford the physical war. Because of the low cost of cyber-attacks, it exposes numerous people to the attacks. The structure of a cyber-attack is a transmission or internet protocol. Makes it difficult as there is no guarantee that the law enforcement or counter-attack purposes to challenge this attack. Other characteristics of a cyber-attack are that they are asymmetric and have a high level of complexity. The asymmetry comes as a result of attacks that can come from anywhere from the world. It means that countries have to have defense mechanisms that take into account prevention and detection procedures to respond and to control all the data channels where attacks are surfacing from. Anonymous networks or systems always resemble a form of technology instead of showing a form of attack behavior. The business of the loss of cyber-attack makes countries quite vulnerable to them. Cyber warfares are not defined across the national borders. Therefore, they do not have laws to protect themselves against it or to enforce them. These nations are the sponsors of these attacks making it difficult to react effectively. Different researchers have tried to study the social implications of the non-state actors and their activities within the cyberspace. Most of the findings show that due to the rise of international terrorism, the non-state actors are now and acting a massive influence on the national government. This comes as a result of policy choices that have to be bound within the virtual world and even on the outside. Specifically, cyberspaces have different advantages including the lowered barriers regarding time and space and the availability of knowledge that is accessible in every region of the globe. The nonstate actors also have the time to expertise the knowledge with the available resources and therefore are always ahead of the government operations. Individuals have a significant career path that they can take with their technical knowledge that they have gained from this cyberspace. Even though the actions undertaken by the nonstate actors have been relatively tame as compared to the traditional warfare that is kinetic based, some experts agree on the potential distractions that can be done by the technical advancement. This is because of the different social activities and necessities that are continuously linked with their network systems.
CHAPTER THREE:ATTRIBUTION IN CASES OF CYBER ATTACKThere are various techniques that a country can use to perform an attribution against any cyber-attack. Attribution refers to the act of finding the identity or the process of locating the position of an attacker. Attribution can also come in the form of identifying an intermediary of an attacker. Within the public literature, the most commonly used attribution methods are traced back tools and source tracking tools. The United States departments of defense have always improved its capability of attribution and have always notified the public on the best methods to do it. Different law enforcement finance has been available especially those that guide transmission control protocol and internet protocol. There is a large number of attribution techniques that have their weaknesses and strengths and that they can all be used according to their attack and none of them can be used instead of the other. Attribution has become difficult and limited because it can cause a crime that is delayed. These articles can also perform crime through different intermediaries and in different jurisdictions making it difficult to make an attribution. In most cases, such instances are encountered when the country is unprepared and is mostly counted by treating the information-gathering techniques and surveillance. Because of the difficulty and uncertainty of this attributions, a computer defense network in a country which is crucial should not depend on the processes of attribution. It proposed that attribution should be just part of a defensive strategy but not something that the whole country depends on. Attribution is also easier against intermediaries that comes from inside the country, and it is difficult from intermediaries coming from outside. Most of these techniques are also immature and requires findings before they are deployed. There are no laws that are agreed universally that is based on attribution procedures acceptable by every country. An attack may be identified to belong to a person name or an association. Location of an attacker can also be found regarding an internet protocol address or an Ethernet address. As a result of cyber-attacks, cyber-attribution can only involve tracking and laying blame onto a perpetrator.
Cyber-attacks usually cause serious consequences for public relations and businesses, of which end up losing their finance reputations and compliances. Because of this, organizations usually conduct investigations to attribute the incident to attract more to an actor to find the reason behind the attack or bring the attacker to justice. The attribution efforts are often done in conjunction with different law enforcement agencies and recently through the non-state actors. Because of the difficulty of this attributions, the underlying architecture of the internet makes it difficult for the states to execute justice in case there is an attack excellently. Dimension and shove cyber attribution is the lack of resources and expertise that is needed to take this criminal down. It is because of this reason that companies and organizations usually hire information experts from outside most of whom are nonstateActors. Cyber attribution has for a long time become a challenge even for the security expert who is always hired. Determining those who are responsible for a cyber-attack, there is always an extensive audit and a forensic investigation that requires analysis of digital evidence or historical data press and the people behind orchestrating these attack. Nonetheless, that occurs usually do not conduct these attacks on their own and are always acting behind emotive. The jurisdictions always hinder the attributions in a cross-border cybercrime especially if an investigation has to involve cross border activities. This can always prevent gathering evidence that should always be conducted as soon as possible after an attack has occurred.
CHAPTER FOUR: MEASURES AVAILABLE FOR STATES TO RESPOND TO ATTACKS4.1 When the cyber attack amounts to an armed attack
When a cyber-attack amounts to an armed attack, the legal authority of the state should use an activedefensee form thathase been long-standing in the country. This defense prevents me from state actors from committing cross-border attacks. Traditionally, it is required that states are prevented from acting illegally against the other states. The duty has also evolved with the changes in terrorism that requires action against illegal acts. When it comes to the realm of warfare in the cyber, states can interpret this law and enforce the criminal laws that they use in a country for cross-border cyber attacks. The demands of these attacks before they amount to an armed attack have always been based on the evolution of the international laws where the stats have to start terrorist attack. The states have to use criminal laws to solve these problems against the cyberattackss when it reaches hiss level. The states can sometimes violate the most crucial duties that are violating the duties and thereby creating the legal pathways for the victims to hold the person responsible for attacking jeopardy. If the state fails in taking actions against cyber attacker, the state is being declared as the ‘sanctuary state.’ Addressing the importance of nonstate actors in cybercrime can be analyzed by reviewing the basic warfare principles that apply to different cyber was from the traditional perspective. Cyber has become a hot topic within the last decades us research areas have been done in this field. This is a technological advancement that is quite fast paced and is rapidly developing making it a serious concern to the public and the governmental organizations. The rapid development of the new technology doctrines, as well as public policies, also make it difficult for various legislations to keep up with the volatile and a subject that is constantly changing. The past literature defines cybercrime as techniques and tools used by security practitioners inside warfare. Well considering various definitions there are types of actions that can be taken during inevitable armed conflicts in the cyber-attack. There are different malicious actions in cybercrime that have identified in the past involving activities with the intent of messing up the operations of the country. The following statements shows how important it is to have a cyber defense:
“…Securing your systems is crucial for the protection of your data and minimizing the damage done. This is where many businesses make a mistake of taking the whole system offline or just removing the malware. Malware is only a symptom of an attack, and you should isolate only the compromised segment of your network and then work on identifying the source of the breach. Since hackers often use admin passwords, you need to change them the second you detect the breach. You should change your access control list, which is usually an automated process, since that is the quickest way of effectively doing so. If you immediately go offline, hackers will know that they have been spotted and they will go silent, preventing you from identifying them. Not to mention that you will lose a considerable amount of data. Therefore, the best thing to do is to leave the compromised machine online, but block it from Internet access. Place an isolated or implement a firewall to prevent the compromised machine from communicating outside your company. That way, you will keep it from doing damage to your network, and you will ensure your business keeps going forward.”
From this statement, several conclusions can be made regarding the challenges that are faced by countries especially when they have been attacked by a cyber-attack. Non-state actors have a major role to play in a cyber attack. This is because of the complexities that are surrounding technology for advancement and technological issues. Ideas in technology are always free and open to everyone to access. As a result, many non-state actors can develop skills that even government agencies may sometimes not afford. This makes nonstate actors important personalities in fighting crime against cyber attack. Even when it comes to the lower end of cyber attacks, such as cyberbullying and stealing of information, it is always important to keep up-to-date with the development of technology. This happens because of the differences that people have in preferences. Nonstate actors can be deployed effectively in case there is an attack against a country. Private organizations also form part of the nonstate actors especially the media personnel who are also concerned about the safety of countries. Even though there are several disadvantages to deploy the nonstate agencies, their role cannot be undermined because they are always up-to-date with the ideas of technology. In case of an attack, the country can deploy numerous remedies especially when they have been attacked by an unknown cyber attack. Many researchers have written about on tracing them. Knowing the type of attack is this initial stage as the laws the country to trace effectively the source where the tick has come from. After realizing the source, better for countries to have mitigation strategies such as attribution that can help estate to realize the source of the attack. Attribution refers to the ability of a technician to locate the source of a cyber attack. This is will, therefore, bear the blame of all the damages that have been done. In most cases, the country can also react and find justice to the damages that have been done. If this happens to be from a different country, then it makes sense as a country can react just in a similar way that they would do if they were attacked by an armed attack. Attribution strategies are many including those that deal with miscellaneous texts such as emails or by the use of IP address. Apart from attribution, various measures are available for countries to take especially if they can locate the source of the cybercrime. The characteristics of internet usage and modern technology make it difficult to have laws that godly operations of the internet. It is even more difficult to tell whether a cyber attack has reached the level of an armed attack and the country have to react if they find the source of the attack. This makes it difficult for different countries to respond to the attacks that are always against them. The main challenge is noticing the source of the attack and finding the attribution strategies that can massively apply to the situation. Use of best goose stepping stone is a frequent strategy that a country have used at a time that a country needs to control computers belonging to innocent civilians. There are times that attackers and cybercriminals use the computers belonging to civilians who are innocent are not involved in these attacks. When this happens, it becomes difficult to investigate the source of the attack and to channel all the blame towards one innocent individual. It is crucial for computer users always to take care of their networks so that they cannot be used to conduct an attack that can result in havoc. However, yeah computers that can be located anywhere in the world through the use of attribution technologies. This takes place even when an attacker has concluded the attack through the use of a computer that is in another country and a network that is in another country to conduct an attack on the other continent. Based on the attacks, a cyber attack can disrupt and destroy any systems that are located remotely and can disrupt out of infrastructure in a country causing one of the biggest economic disruptions to be witnessed. Avoiding site states always require a legal framework to be used to allow our country to respond to such attacks and protect itself from the enemies that are willing to conduct the attacks. The legal and international frameworks have been used for a long time to help make decisions that are affecting a country. Even though there is no except for the definition of the word cyber, it is still one of the most debated topics in the world today. Concepts are used to define it to have a universally agreed framework that can be used by the national cyber security manuals. Cyberspace was a concept that was proposed to show how free the internet was and the lawlessness of its operations.
Nonstate actors have been seen to be the gun nuts of cyber attacks even if they have not seen a massive level of success regarding harming the countries. The nonstate digital actors have been engaging in low-level actions that are primarily in denial services. The 21st century has been seen to be the age where they are potential damages of tooth infrastructures due to the advancement in technology. Contrary to the traditional structures and authoritative resumes, state organizations are flat and are always dispatched rather than being radical and responding to a single commander. This makes them different from the state actors, and they are key to other deals. The cyberspace has given both the state actors and the nonstate actors a massive degree of anonymity so that they can operate without anyone noticing activities. The main access that is behind a cyber attack is always over secure, and their identities are not easy to find. This is why it is always necessary to have the speed of access while transmitting the data that would challenge a tenant server. The serenity of a country even makes it difficult to attribute the attacks that are done by their state actors and nonstate actors. Independence of the networks in the computer are also controls in the public structure. This independence gives an incredible susceptibility to the targets four activities that can be referred to as being malicious. Various vital infrastructures are quite vulnerable to all the attacks conducted by both man state and state actors. Assessment of traffic controls and financial markets have been making these ideas quests especially those that are controlled by the internet. These infrastructures are quite vulnerable and massive staggering losses to a property or a life. If such issues take place in a tradition of warfare, it may result in kinetic warfare. Reviewing potential policy responses and capabilities of non-state actors is important in determining the responses regarding unilateral and multilateral sources. Numerous sources have been adapted to be used as doctrines for geopolitical stages and frameworks that occupies more traditional areas. Several sources entertain the adaptation overdue political framework and doctrine that can be used to solve international conflicts. The goal of such a doctrine is to influence the decision-making processes, especially when launching a cyber attack against countries. It have to rely on the country and the attacked to project its willpower to make its reputation and influencing decision-making processes. It also depends on ability over the country to predict the situation at a global scale. The country cannot just act against another sovereign state especially if they are suspicious of having launched an attack. The use of deterrence applies when there is a strategy of obtaining justice against the country that has launched a cyber attack against the other. It has seven basic steps that have to be followed. The first step is renaissance that takes place when cyber attack is launched, and the target has been achieved. It was so involved scanning and technical examination of the network. It involves a massive planning phase that undertakes research where the target has to meet the objectives set after being triggered by different situations. An example of an attack that took place at the recognizing step was the Norwegian defense that was a target too an attack especially when they were participating in the bombing of Libya in the year 2011. Weaponization is the other step which goes on after target have been realized and an operation he is supposed to take place. Weaponization takes place after an operation has been selected and the staging phase begins. It involves creating a malware that can generate a virus to destroy all the tools automatically. That usually requires a sophisticated of skill with very expensive resources that are possessed by the attacker. The delivery is there next step which marks the point of launching the operation and malware is tested at this point and directed towards a target. Because the manure had already been created, it is therefore used as a tool to interfere with the target. Delivery can be done in different ways such as sending a malicious email or having a USB stuck inside a computer. Some cases, it can involve the use of web pages so has to have a close connection of the system. The delivery process can be done in different ways but have always been done through the internet especially when the attacker accesses the information. If not done through the internet, the delivery of the malware can be done through a closed system or the use of a USB stick. Exploration is the first step of conducting a cyber attack where the intruder is gaining access to the information of a victim. The victim is therefore exploited by the attacker to know all the information through the use of malicious software that is designed to damage or disrupt the information. After their attacker has gained access to the full control of information, it is up to them to determine what to do with it. Severally, the information is disrupted and used to distribute the virus to even more places. Gaining access to information is crucial idea as it is used by the attackers this information could be financially important especially if it involves the whole country.
The most commonly used attribution techniques our special but definitive. It is not easy to find the most concise. The continuous advancement in technology also makes it difficult because new threats are always developed. This makes old attribution techniques that had been defined quite difficult to implement because they are outdated. Investigators of cybercrimes always use analysis tools and programs that uncovers critical information on the attackers. They are often presented with the data on programming languages related to the information including the compilers used to conduct the activity and the time as well as the library used in the attack. An example is when an investigator determines a man were written in Chinese. This information can be used to narrow down suspects of the cyber attribution. Investigators sometimes attempt to do an attribution through analyzing the presented meta-data connected to the attack. Meta-data include the IP addresses, hosts for emails at the domain names. The domain name registration can lead the investigator to a third-party source that can help them make an attribution because these attacks often communicate through the nodes that are outside their networks target. The data can sometimes defect which even presents more challenges to the investigator. Nonetheless, this metadata can use at the initial stages to help that investigator and attribute as to narrow down their suspects as required.
Sometimes, fusion may involve analyzing the data collected from multiple targets. This requires an expert who makes assumptions that are based on their falsified data identified. An example is when a professional process and a nominee must email address and links it back to the domain names that are attack had been identified in the first place. The other commonly used approach is where investigators examine the procedures and tactics used in the attack. Cyber-attacks often have their recognized styles. This distinctive styles can be identified by professionals who are always working to pin down these attack this can be used in conjunction with their falsified data. In most cases, the investigators have identified perpetrators based on the clues that they have heard from the past attacks. These can include engineering tactics or reusing the malware from the other attacks that had happened earlier. If there is some knowledge about what is happening in certain industries, the attributes can predict an attack based on these uncertainties. An example is when a company operating on natural gas spends money exploring the gas, as a consequence of this, there must be a possibility of stealing geospatial data. The motives of the attacker have to be understood and the person or estate behind the cyber-attack. The lack of security to know of the perpetrator because in most cases it is not money. This can help them figure out cybercrimes and criminals who have been saying for a long time in case they have not contacted an impending attack. Cyber-attack is not exactly science because the techniques are identifiable.
The increasing importance of modern technology and advancement in cyberspace within the society he’s becoming something of a national security concern in many government processes in the whole globe. Cyber security is also increasingly becoming an arena of the dispute with special characteristics that cannot be solved easily. Different characteristics of surface security such as its nature which is isometric and they massive lack of attributions coupled with the low entry costs make it one of the most attractive in national state and non-state act within the cyber-security conflict. Other characteristics of cyber security that makes it more significant are the legal and equity surrounding it together with the role of an efficient medium for crime and the protest together with a sponge military aggression. This dissertation will analyze different non- state actors that are quiet listing within their cyber security space and examine the motives behind them. It will also look at the incitement through analyzing how these objectives coincide with the once for the nation-state The literature from the first suggests that several nations are pursuing the warfare of cyber security and the capabilities that they have while also leveraging different criminal organizations through the use of regular and irregular forces. Employment of this nonstate actor such as activist, patriotic hackers together with the cyber security within the state cyberspace operations is also useful for conducting cyber-attacks. Cyber-attacks are imagined to be one of the basic tools that the state powers are using to reshape the future warfare; nonetheless, the lack of concrete experience in cyber security together with unlimited legitimation of cyber-attacks makes it assess the future effects and risks of cyber security.
The world is increasingly becoming hooked on to the operations of information technology and communication. The rate at which things are becoming digitalized is even alarming to the creators of technology themselves. In our daily lives, numerous things are shaped by technology especially the time that people use on computers, mad phones, and the internet. Technology is even operating other basic needs such as electricity, clean water, transportation, and security. What if things are integrated into technology and network forming a critical infrastructure in the peoples’ lives? As a result of technology and the network is a critical part of these basic services, there has been a massive interdependency of information requirement that makes services even more efficient and excessively. At the same time, the accessibility and efficiency created by educational technology and networks also make these items and ideas more vulnerable and prone to failure in case of an adversary or an attack. Throughout the last few decades, the global use of the internet has been increasing at the rate of five hundred percent that has grown from two million in the year 2002 more than three billion in the year 2015. This means that three years later the use of the internet is maybe covering more than 60% of the population of the entire globe. Besides, internet makes communication easy and even it is essential for customers when making orders from their sellers. Because more people are getting online, cyber-security is also becoming a concern and something that is defining the life of individuals. Cyber security is also threatening interactions of the people as many communities and organizations are socializing across the national boundaries in the networks. Cyber security is becoming a more defining feature that is part of modern life. Despite the success that comes with it, cyberspace has brought new threats that are even more severe than the threats that the logo’s facing before its intervention. Cyber dependency is widespread in the society complicating the interconnections of different sectors and increasing the vulnerability of civilians and military infrastructures to attacks from other countries and other organizations. In the military, cyber-security is always a threat in all aspects of national securities starting from the land, space, under the sea. Oldies spaces have identified cyber security to undermine the operations of the military. These operations are not as in the form of offensive measures as well as defensive measures that are put to help the people from bad to the threats and vulnerabilities posed by cyber security. Cyberspace security can be performed in an independent manner or in a way that is convenient to the warfare. Even though the nation-state cant is the main player in this full-scale cyber war, there have been recent events showing that nonstate actors are crucial and play key roles during events of attack and the massively contribute to the low intensive cyber schemes. Openly, they are cited as cyber-attacks. An example of a cyber-attack was the one that took place in Estonia in the spring of the year 2007 where they are volunteers that actively took place in a cyber-conflict openly acting as if they were some form of cyber militia. When it took place, the volunteers rallied the overload in different cyberspace resources including the government and other commercial services. This is an example of a voluntary estate idea that managed to help a country in the year 2007. The other example was anonymous which was a collection of activists that were responsible for several publicized well departments as well as leaks of information. They are cyber actions that are related to national security and military affairs at are not directly involved in a national affair. Rogue malware writers other cybercriminals have also become active within the last two decades after they have been motivated by the various economic gains.
Most cybercriminals are mainly motivated by economic gains. In the year 2009, ghost net discovered confidential information that belongs to the government and other private organizations in more than 11 countries throughout the globe. This information was claimed that it came from software that was controlled by a server in China. However, responsibilities were denied by China as the government claimed not to know of the existence of ghosts net and therefore there was no conclusive evidence of the Chinese government participation in the operation.
The concept of cyber where and cybercrime is gradually becoming relevant in my states calling for quick action from the military cyberspace capable of forming intelligence agencies around the world. The demand of cybercrime also becomes a complex idea because of the continuously increasing advancement in technology. A cybercrime becomes more relevant in many nations states, the top priority in the world is all concerned about the safety of military operations. The year 2017, the department of defense in the United States approved an expansion of how it operates its cyber prediction. The department has therefore increased the troops that cover cyber operations to more than 5000 while also incorporating the civilians.
4.1 When the cyber attack does not reach the level of an armed attackWhen an armed attack does not reach the level of a cyber attack, it is always necessary to have the best strategies that can mitigate against attack. In most cases, this requires the technical skills from the responsible organization and in some cases from the non-state actors. It is always necessary for the business and other organizations to have a security system to ensure that the business is continuous. After there is a breach as a result of a cyber-attack, the first step is for the technical experts to secure a system that can allow the business of the organization to continue to operate. The organization can also isolate or suspend some sections in the network temporarily if they are affected. The disruption can sometimes be costly to a state or an organization. In different countries around the globe, there have been similar cyber mobilizations aimed towards a target. Even though well-developed countries can have better defensive capabilities to protect themselves from digital resource vulnerability, including having better command and controls for their systems, less developed countries, and developing countries are recognizing the operations of cybercrime as Arabia that is attracting methodologies. They are therefore resolving two methods that are inexpensive and risk-free especially when they are waging war against anyways. Non-state actors are therefore being approached by different governments on a global scale. These governments seek to benefit from their experiences to leverage their cyber security and to attain the capabilities of other countries. In most cases, this has been the explanation to the case of ghost net. Currently, there is even more increase in demand for the incorporation of technology in other areas of work and infrastructure. As the operations of cyber security become gradually relevant to many nine states, achieving military operations demands more attention and resources. As many countries also approach nonstate actors to approach the globalization events and benefit the experiences of these countries, it is also becoming a concern for countries that do not promote such activities. The operations between the US and Israel also shows an interesting development on the growing importance of nonstate actors in cybercrime. Cyber-crime is mainly aimed at a conflict that is based on the non state actors and the other states. Involvement of nonstate actors disables positions it’s a question of warfare that regards to the acceptance of the extreme precautions. Cyber security and cyber attacks have been some of the major concerns for the international nose as they cut across all the domains. This is because they do affect not only the military sphere but also other forms of information communication and technology. When a cyber attack takes place, it’ tampers with economic social and cultural environment of a country. Because this is an area that is constantly developing, it can become difficult to realize the frameworks that can successfully apply to cyber-attacks for concepts that can be agreed on universal level address the malicious activities. The process of validating the hypothesis that has been proposed in this thesis shows that cyber security is a concern too many countries and nonstate actors play a key role in cyber attack. Because cyber attack cuts across regions, the estate may be required to respond through the use of realism and constructivism approach in case they do not understand the best methods of solving the problems. The technical aspect cyber attack should not be neglected especially when a country is protecting itself against an external attack. They are various case studies that have shown that this information technology for advancement requires skills that are always evolving to respond to attacks and make sure that an attempt is detected at early stages. Various methods are used by experts to avoid infection by a virus or an intrusion of malware that can affect the information system. Both the technical responses and mainstream theories show the capabilities in case of a cyber attack. This defensive capability can be the main differences when an attack shut down the system and operations stop. It is also important to collaborate with other institutions at the international level to agree on the methods to adopt the codes of conduct of operating in such a situation. Most of the cyber-attacks take place under some assumptions that countries have to be aware of. The first is that cyber attacks only tech countries that have a connection of some sort. As well, defining the responses that countries display is difficult, and states have to remain cautious about their connectivity. Various case studies in the past have shown the best strategies to help the presented problems. This methods had been tested in the past and mainly depend on counteractive measures making them not quite effective. Because the responses to cyber attack always results to an attack, it is usually difficult to deal with. The best way to do a response maybe attrition which is a country after they have participated in the warfare. This even complicated the matter is especially to the countries that do not have the laws covering cyber-attacks. The best way of understanding the legal backgrounds of cyber-attack is through defining the accepted operations around the globe. It is stated that a cyber operation can be offensive or defensive destruction that is caused by the networks meant to achieve a particular purpose. If a country uses this basic definition of cyber attack to attack the others, it loses meaning and causes more problems between countries. The case of a cyber attack that took place in the year 2008 in Estonia was done against the United States military system was as a result of a counter-attack meant to convert a fireball. It is stated that it was supposed to make the encryption stronger by installing security packages and design malware that could prevent such an attack. Issues that responses to cyber-attack he’s always disclosed my government and mainly depend on the information communication technologies. The most important item to consider is that every state comes up with mechanisms that can help them defend themselves against any form of cyber attack. Also, the legislation that covers cyber security have been drafted in different states but cannot be imposed because of such controversies. The other important consideration takes place well various countries respond differently to that cyber-attacks. The case of Estonia was a basic example as it had the concepts and ideas of preventing crime when protecting itself against bridges of information communication and technology. It is also important to share the responsibilities done in ensuring that the country is safe from cyber attack. The defense should also be done in collaboration with the other bodies. These important bodies that can contribute to cyber protection include interior ministries who established the proceedings of information technology and the police boarder who is in charge of preventing any attack. In conjunction with the other government bodies, the national defense should synchronize various items that they need to ensure that they maintain your dependence and sovereignty of a country are thereby protecting it from any form of cyber attack. In the US, the country focuses on the importance of the military especially when they are responding to a cyber attack. The military has always remained ready to prevent any cyber attack and is always ready to retaliate in case of a threat. In the world that it continuously involves concerning technology, major threats are facing nations because of the digital nature of the operations. In response to these threats, many states and countries us trying to implement serious measures that can help them counter their threats and to also help in advancing the overall in network security in the country. The network in a country is crucial as it forms part of the system that guides the nation. Securing the network, he’s one of the first steps in ensuring the better country is operating privately can disable to protect itself from the others. Securing cyberspace is a priority to many countries especially in the administration. There are those that are quite concerned about the economic status. Stealing financial intelligence of countries that are economically viable can help one country to compete and downtime the other one. It is this reason that can care about the information to allow the network insecure. However, if countries do not have the necessary expertise to counter this malice, numerous alternatives can be used. In Saudi Arabia, a cyber attack destroyed more than 30000 computers operating oil Production Company. It is always a concern that day people steal information usually sell them or release them to the public. This even danced more damage to the image of the organization whose information has been released. To deal with this threat, it is important for countries to leverage the process by motivating the private sectors and make productive investments so that they can make the networks diverse and most secure. Dealing with this growing threat requires motivation from the private sectors and investment from companies and the states as a whole. Every country should pursue the best cyber security policies to avoid a regulatory approach that may be cumbersome. Instead, they should give key elements and give dynamic security defense such as undertaking a great internal engagement in cyber security and encouraging the development of a valued cyber security business. The principle of the law states that:
“..Nothing in the foregoing paragraphs shall be constructed as enlarging or diminishing in any way the scope of these provisions of the Charter concerning cases in which the use of force is lawful”.248 In Nicaragua, ICJ based its decision on the norms of international customary law concerning the self-defense against an armed attack that has already occurred.249 ICJ stated in Nicaragua that the Declaration on Friendly Relations demonstrates that the members of the General Assembly regard the prohibition of the use of force constituted by the right to self-defense as already being a matter of international customary law.250 According to the Court, the framers of the Charter thereby acknowledged that self-defense was a preexisting right of a customary nature, which the drafters wanted to preserve. 251 Article 51 only addresses the Members of the United Nations, as subjects who can carry out self-defense, but since self-defense are a part of international customary law as well as the law of the Charter, it will therefore also apply to non-members of the United Nations..”
Countries can bring together the non-state actors to help them deal with operations that they cannot handle. This has been proposed in many summit meetings where countries are finding solutions for the threats that they are facing. Saudi Arabia is a country suffered massively in the hands of cyber-attack. As a result, they resolved to use nonstate actors when handling the cases of security problems. Internet security should be boot as a collaborative yea especially in countries that do not have the technological advancement level to match the other developed countries. This can also be a step to achieving security especially if a country shares some of the information to the developed countries. In many cases, creating awareness can also help people know about the truth about cyber threat. Businesses and homes can protect themselves especially if they know that they are also under threat. The government also have to account for standards and develop accountability. Responding to a great super cyber security campaign is an economic measure that can be used diplomatically to discourage. The non-state approach can prevent a great approach that can even be more costly to be country. The country should also encourage and allow effective cyber security business within their local region. By supporting extensive research, it is imminent that the country will be better in protecting itself against any cyber attack. It is also important that a country protect the cyber supply chain. In this sense, the components of computers should be securely brought into a country. Cyber security can take place in different forms including using the gadgets that are made worldwide to pass insecure malware. Therefore an organization should be given the mandate to receive products of high quality and those that are safer for the country. This can discourage cheap or less expensive items but are potentially dangerous. The existence of a controlled cyber defense authority helping to protect against hackers who are trying to access the country.
BibliographyAaviksoo, J. (2010). Cyber-attacks against Estonia raised awareness of cyber threats.Defense against Terrorism Review, 3, 13-22.
Asal, V., Mauslein, J., Murdie, A., Young, J., Cousins, K., & Bronk, C. (2016). Repression, education, and politically motivated cyber attacks. Journal of Global Security Studies, 1(3), 235-247.
Baron, J., O’Mahony, A., Manheim, D., & Dion-Schwarz, C. (2015). National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment. RAND Corporation-NDRI Santa Monica United States.
Betz, D. J. (2017). Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge.
Betz, David , . and Stevens, Tim, (2013), Analogical Reasoning and Cyber Security, Security Dialogue 44
Borchgrave, Arnaud De, (2000), Cyber Threats and Information Security Meeting the 21th Century Challenge 8, Centre for Security and Information Studies, cited in Jensen (2012),
Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival, 55(2), 81 96. Graham, D. E. (2010). Cyber threats and the law of war. J. Nat’l Sec. L. & Pol’y, 4, 87. Margulies, P. (2013). Sovereignty and cyber attacks: Technology’s challenge to the law of state responsibility. Melb. J. Int’l L., 14, 496.
Buchan, Russel, (2012), Cyber Attacks: Unlawful Uses of Force or Prohibited Intervention? Journal of Conflict & Security Law, Oxford University Press
Bussolati, N. (2015). ‘The Rise of Non-State Actors in Cyberwarfare.’
Byström, Karin. (2005), Proceedings of the conference: International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm: Swedish National Defense College
Casey-Maslen, Stuart (2014), Weapons Under International Human Rights Law, Cambridge University Press
Cassese, Antonio, (2005), International Law, 2nd Edition, Oxford University Press
Castel, M. E. (2012). International and Canadian law rules applicable to cyber attacks by state and non-state actors: Canadian Journal of Law and Technology, 10(1).
Computer Network Attacks on Critical National Infrastructure: A Use of Force Invokinth Th rightht of Self-defense, 38 Stanford Journal of International Law vol. 38
Condron, Sean, (2007), Getting it right: Protecting American Critical Infrastructure In Cyberspace, Harvard Journal of Law & Technology, Volume 20
Crawford, James, (2012), Brownlie’s Principles of Public International Law, Oxford University Press
Davis, P. K. (2014). Deterrence, influence, cyber attack, and cyber war. NYUJ Int’l L. & Pol., 47, 327.
DeLuca, C. D. (2013). The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors. Pace Int’l L. Rev. Online Companion, ii.
Denning, Peter J., and Dorothy E. Denning. “Discussing cyber attack.” Communications of the ACM 53, no. 9 (2010): 29-31.
Dev, Priyanka R., (2015). “Use of Force” and “armed attack” Thresholds in Cyber Conflict: The Looming Definitional Gaps and the Growing need for Formal U.N. Response Texas International law Journal vol. 50
Dinicu, A. (2014). Cyber threats to national security. Specific features and actors involved. Scientific Bulletin-Nicolae Balcescu Land Forces Academy, 19(2), 109.
Dinniss, Heather Harrison, (2012), Cyber Warfare and the Laws of War. New York: Cambridge University Press
Dinstein, Yoram, (2002), Computer Network Attacks and International Law, International Law Studies – Vol. 76
Dinstein, Yoram, (2013), Cyber War and International Law: Concluding Remarks ae 2012 Naval War College International Law Conference, International Law Studies 89
Dinstein, Yoram. (2012). War, Aggression, and Self-defense. New York: Cambridge University Press.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23-40.
Garner, Bryan and Black, Henry, (2009), Black’s Law Dictionary. St. Paul, MN: West
Geers, K. (2010). The challenge of cyber attack deterrence. Computer Law & Security Review, 26(3), 298-303.
Gonsalves, Paul G., Catherine Dudley Call, Stephen Ho, and David Lapsley. “Security system for and method of detecting and responding to cyber attacks on large network systems.”U.S. Patent 7,930,256, issued April 19, 2011.
Green, James, (2009), Fluctuating Evidentiary Standards for Self-defense in the International Court of Justice, Internation, l and Comparative Law Quarterly vol. 58-55
Gross, J. R. (2015). Hack and Be Hacked: A Framework for the United States to Respond to Non-State Actors in Cyberspace. Cal. W. Int’l LJ, 46, 109.
Grosswald, L. (2010). Cyber attack Attribution Matters under Article 51 of the UN Charter. Brook. J. Int’l L., 36, 1151.
Handler, Stephanie (2012), The New Cyber Face of Battle: Developing a Legal Approach t Accommodatete Emerging Trends in Warfare, Standford Journal oInternationalal La vol. 48
Hannikainen, Lauri, (1988), Peremptory norms (jus cogens) in international law. Helsinki: Finnish Lawyers’ Pub. Co
Harris, David. (2004), Cases and Materials on International Law. London: Sweet & Maxwell
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817-885.
Heintschel von Heinegg, Wolff, (2013), Territorial Sovereignty and Neutrality in Cyberspace, International Law Studies 89
Henkin, Louis, (1971), The Reports Of The Death of Article 2(4) are Greatly Exaggerated, AJIL 65
Hongju Koh, Harold, (2012), International Law in Cyberspace, Faculty Scholarship Series. Paper 4854. Available at: http://digitalcommons.law.yale.edu/fss_papers/4854 (las accessed 19 March 19, 2016)
Hutchins, Er, c et al., (2010), Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Lockheed Marti Corporation.Available at https://www.google.no/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja& ct=8&ved=0ahUKEwjs_OeE0ffLAhXHFywKHU4dDWIQFggfMAA&url=http% %2F%2Fwww.lockheedmartin.com%2Fcontent%2Fdam%2Flockheed%2Fdata%2Fccorporate%2Fdocuments%2FLM-White-Paper-Intel-rivenDefense.pdf&usg=AFQjCNHIIPq8g4rl2LEnXqGQUkBlXWIYJg&sig2=kRendPvzljMIGwLpzcbfQ (last accessed 5 April 2016)
Jensen, Eric Talbot (2012), Computer Network Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-defense, 38 Stanford Journal of International Law vol.
Kadivar, M. (2014). Cyber-attack attributes. Technology Innovation Management Review, 4(11).
Lewis, J. A. (2010). The electrical grid as a target for cyber attack. Center for Strategic and International Studies.
Libicki, M. C. (2012). The specter of non-obvious warfare. Strategic Studies Quarterly, 6(3), 88-101.
Liff, A. P. (2012). Cyber war: a new ‘absolute weapon’? The proliferation of cyber warfare capabilities and regional war. Journal of Strategic Studies, 35(3), 401-428.
Lindsay, J. R. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyber attack. Journal of Cyber security, 1(1), 53-67.
Lockheed Martin Presentation: Gaining the advantage: Applying Cyber Kill Chain Methodology to Network Defense, Lockheed Martin, available at: http://cdn2.hubspot.net/hubfs/91979/Gaining_the_Advantage_Cyber_Kill_Chain.pd t=1459783725510&utm_campaign=Commercial+Cyber&utm_source=hs_automation&utm_medium=email&utm_content=21881761&_hsenc=p2ANqtz-8cr09KZaN2zypp5DVXY61NM8WOUa8WolIWEbmilZIHlySlNuHD7D1cuB8wAoAqDTklkdr2mYB_jz-RhLIlVS_LjK3Zg&_hsmi=21881761 (last accessed at 11 April 2016)
Mač ák, K. (2016). Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of cyber operations by non-state actors. Journal of Conflict and Security Law, 21(3), 405-428.
Melzer, Nils (2011). Cyberwarfare and International Law, UNDIR Resources
Messerschmidt, J. E. (2013). Hackback: Permitting retaliatory hacking by non-state actors as proportionate countermeasures to transboundary cyber harm. Colum. J. Transnat’l L., 52, 275.
Nguyen, Reese, (2013), Navigating Jus Ad Bellum in the Age of Cyber Warfare, California Law Review vol. 101
Ohlin, Jens David, Govern, Kevin and Finkelstein, Claire. (n.d.). (2015), Cyber war: Law and Ethics for Virtual Conflicts, 1 Edition. Oxford University Press
Park, G. K. (2012). Granting an Automatic Authorization for Military Response: Protecting National Critical Infrastructure from Cyber attack. Brook. J. Int’l L., 38, 797.
Pipyros, K., Mitrou, L., Gritzalis, D., & Apostolopoulos, T. (2014, July). A cyber-attack evaluation methodology. In Proc. of the 13th European Conference on Cyber Warfare and Security (pp. 264-270).
Rid, Thomas, (2013), Cyber War Will Not Take Place, Journal of Strategic Studies, Vol. 35, Iss. 1
Riddell, An, a and Plant, Brendan, (2009), Evidence before the International Court of Justice. London: British Institute of International and Comparative Law
Roberts, S. (2014). Cyberwars: applying customary laws to war to cyber warfare and non state actors. N. Ky. L. Rev., 41, 535.
Roscini, Marco, (2010), World Wide Warfare – Jus aBellumum and the Use of Cyber Force, Max Planck Yearbook of United Nations Law, Volume 1456
Roscini, Marco. (2014), Cyber Operations and the Use of Force in International law. Oxford: Oxford University Press
Ruys, Tom. (2010), “Armed attack” and Article 51 of the UN Charter. CambridgeCambridge University Press
Scassa, Teresa and Currie, Robert J., (2011), New First Principles? Assessing the Internets Challenges to Jurisdiction, Georgetown Journal of International Law 42
Schmidt, N. (2016). Super-empowering of non-state actors in cyberspace. World International Studies Committee 2014.
Schmitt, Michael, (1999), Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. 37 Colum. J. Transnat`l l: 885
Schmitt, Michael, (2012). The “Use of Force” in Cyberspace: A Reply to .Dr Ziolkowski. Available online: https://ccdcoe.org/publications/2012proceedings/5_4_Schmidt_ResponseToZiolkowski.pdf
Shackelford, S. J., & Andres, R. B. (2010). State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem. Geo. J. Int’l L., 42, 971.
Sharp, Walter, (1999), Cyberspace and the Use of Force. Falls Church, Va.: Aegis ResearchCorp
Shaw, Malcolm N. (2014), International Law, 7th Edition, Cambridge University Press Schmitt, Michael. (n.d.), Tallinn Manual on the International Law Applicable Cyber Warfare, Cambridge University Press
Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
Simma, Bru, o and Mosler, Hermann. (1995). The Charter of the United Nations. First Edition, Oxford: Oxford University Press
Simma, Bruno., Mosler, Hermann., Paulus, AndreasAndnd Chaitidou, Elini. (2002), The Charter of the United Nations. 2nd Edition. Oxford: Oxford University Press
Simma, Bruno., Mosler, Hermann., Paulus, AndreasAndnd Chaitidou, Elini. (n.d.). (2012 The Charter of the United Nations. 3nd Edition. Oxford University Press.
Straub, J. (2016). Consideration of the use of autonomous, non-recallable uncrewed vehicles and programs as a deterrent or threat by state actors and others. Technology in Society, 44, 39-47.
Tereshchenko, N. (2012). US Foreign Policy Challenges of Non-State Actors’ Cyber Terrorism against Critical Infrastructure. International Journal of Cyber Warfare and Terrorism (IJCWT), 2(4), 28-48.
Tsagourias, N. (2012). Cyber attacks, self-defense and the problem of attribution. Journal of conflict and security law, 17(2), 229-244.
Tsagourias, Nicholas and Buchan, Russell. (n.d.). (2015), Research Handbook on International Law and Cyberspace, Edward Elgar Publishing
Tsagourias, Nicholas, (2012) Cyber Attacks, Self-defense and the Problem of Attribution. Journal of Conflict and Security Law, 17(2), 229-244
Waldock, Claud Humphrey Meredith, The Regulation of the Use of Force by Individua States in International Law, Rec de Cours 81 (1952-II)
Waxman, Matthew C, (2011), Cyber-attacks and the Use of Force: Back to the Future of Article 2(4), Yale Journal of International Law
Zemanek, Karl, (2010), Armed Attack, in Rüdiger Wolfrum (ed.), Max Planck Encyclopedia of Public International Law
Ziolkowski, Katharina, (2012). Stuxnet – Legal Considerations, NATO Cooperative Cyber Defense Centre of Excellence
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.