Armed Attack in Cyberspace: Difference between revisions
No edit summary |
|||
Line 10: | Line 10: | ||
==Categorization== | ==Categorization== | ||
* Issues: [[Cyberwar]] | * Threats and Actors: [[Financial Institutions and Networks]]; [[Military Networks (.mil)]]; [[Public Data Networks]]; [[Telephone]]; [[Terrorists]] | ||
* Issues: [[Economics of Cybersecurity]]; [[Espionage]]; [[Incentives]]; [[Government to Government]]; [[Cybercrime]]; [[Cyberwar]] | |||
* Approaches: [[Regulation/Liability]] | |||
==Key Words== | ==Key Words== |
Revision as of 13:23, 8 July 2010
Full Title of Reference
Armed Attack In Cyberspace. Deterring Asymmetric Warfare With An Asymmetric Definition
Full Citation
Graham H. Todd, Armed Attack In Cyberspace. Deterring Asymmetric Warfare With An Asymmetric Definition 64 A.F. L. Rev. 65 (2009). Web
Categorization
- Threats and Actors: Financial Institutions and Networks; Military Networks (.mil); Public Data Networks; Telephone; Terrorists
- Issues: Economics of Cybersecurity; Espionage; Incentives; Government to Government; Cybercrime; Cyberwar
- Approaches: Regulation/Liability
Key Words
Synopsis
The article will first examine cyberspace and how current approaches have attempted to apply international law to armed attacks in cyberspace. Looking through the lens of current international laws will highlight how the unique attributes of cyberspace could increase the likelihood of international conflict. The article will identify how the failure of international law to define armed attacks and weapons further exacerbates this problem. The article will then transition from current international laws to examine whether current criminal law definitions and methodologies can fill the gap and provide realistic definitions of weapons and armed attacks in cyberspace. Lastly, the article will put these proposed definitions to the test against the most challenging aspects of cyberspace: attribution and espionage.