Show simple item record

dc.contributor.authorReich, Pauline
dc.contributor.authorWeinstein, Stuart
dc.contributor.authorWild, Charles
dc.contributor.authorCabanlong, Allan
dc.date.accessioned2016-04-04T13:12:52Z
dc.date.available2016-04-04T13:12:52Z
dc.date.issued2010
dc.identifier.citationReich , P , Weinstein , S , Wild , C & Cabanlong , A 2010 , ' Cyber Warfare : A review of Theories, Law, Policies, Actual Incidents – and The Dilemma of Anonymity ' , European Journal of Law and Technology , vol. 1 , no. 2 , pp. 1-58 . < http://ejlt.org/article/view/40 >
dc.identifier.issn2042-115X
dc.identifier.urihttp://hdl.handle.net/2299/16939
dc.description.abstractIn this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, actual incidents - and the dilemma of anonymity. Starting with the United Kingdom perspective on cyber warfare, the authors then consider United States' views including the perspective of its military on the law of war and its general inapplicability to cyber conflict. Consideration is then given to the work of the United Nations' group of cyber security specialists and diplomats who as of July 2010 have agreed upon a set of recommendations to the United Nations Secretary General for negotiations on an international computer security treaty. An examination of the use of a nation's cybercrime law to prosecute violations that occur over the Internet indicates the inherent limits caused by the jurisdictional limits of domestic law to address cross-border cybercrime scenarios. Actual incidents from Estonia (2007), Georgia (2008), Republic of Korea (2009), Japan (2010), ongoing attacks on the United States as well as other incidents and reports on ongoing attacks are considered as well. Despite the increasing sophistication of such cyber attacks, it is evident that these attacks were met with a limited use of law and policy to combat them that can be only be characterised as a response posture defined by restraint. Recommendations are then examined for overcoming the attribution problem. The paper then considers when do cyber attacks rise to the level of an act of war by reference to the work of scholars such as Schmitt and Wingfield. Further evaluation of the special impact that non-state actors may have and some theories on how to deal with the problem of asymmetric players are considered. Discussion and possible solutions are offered. A conclusion is offered drawing some guidance from the writings of the Chinese philosopher Sun Tzu. Finally, an appendix providing a technical overview of the problem of attribution and the dilemma of anonymity in cyberspace is provided.en
dc.language.isoeng
dc.relation.ispartofEuropean Journal of Law and Technology
dc.subjectcyber warfare
dc.subjectSun Tzu
dc.subjectInternational Law
dc.titleCyber Warfare : A review of Theories, Law, Policies, Actual Incidents – and The Dilemma of Anonymityen
dc.contributor.institutionHertfordshire Law School
dc.contributor.institutionSocial Sciences, Arts & Humanities Research Institute
dc.contributor.institutionLaw
dc.description.statusPeer reviewed
dc.identifier.urlhttp://ejlt.org/article/view/40
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record