Difference between revisions of "Armed Attack in Cyberspace"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Armed Attack In Cyberspace. Deterring Asymmetric Warfare With An Asymmetric Definition== ==Full Citation== Graham H. Todd, ''Armed Attack In Cyberspace. Deterring Asymmetric Warfare Wi...)
 
Line 9: Line 9:
 
==Categorization==
 
==Categorization==
  
Issues: [[Laws of War/Cyberwar]]
+
* Issues: [[Laws of War/Cyberwar]]
  
 
==Key Words==  
 
==Key Words==  
  
''See the article itself for any key words as a starting point''
 
  
 
==Synopsis==
 
==Synopsis==
  
 
The article will first examine cyberspace and how current approaches have attempted to apply international law to armed attacks in cyberspace. Looking through the lens of current international laws will highlight how the unique attributes of cyberspace could increase the likelihood of international conflict. The article will identify how the failure of international law to define armed attacks and weapons further exacerbates this problem. The article will then transition from current international laws to examine whether current criminal law definitions and methodologies can fill the gap and provide realistic definitions of weapons and armed attacks in cyberspace. Lastly, the article will put these proposed definitions to the test against the most challenging aspects of cyberspace: attribution and espionage.  
 
The article will first examine cyberspace and how current approaches have attempted to apply international law to armed attacks in cyberspace. Looking through the lens of current international laws will highlight how the unique attributes of cyberspace could increase the likelihood of international conflict. The article will identify how the failure of international law to define armed attacks and weapons further exacerbates this problem. The article will then transition from current international laws to examine whether current criminal law definitions and methodologies can fill the gap and provide realistic definitions of weapons and armed attacks in cyberspace. Lastly, the article will put these proposed definitions to the test against the most challenging aspects of cyberspace: attribution and espionage.  
 
==Policy Relevance==
 
 
''Policy and Legal Implications, relevant law.
 
 
==Case Examples==
 
  
 
==Additional Notes and Highlights==
 
==Additional Notes and Highlights==
 
'' * Outline key points of interest
 
* Include quotes if relevant/useful
 
* Consider how these themes relate to other cases, broader thematic areas, etc''
 

Revision as of 20:37, 21 May 2010

Armed Attack In Cyberspace. Deterring Asymmetric Warfare With An Asymmetric Definition

Full Citation

Graham H. Todd, Armed Attack In Cyberspace. Deterring Asymmetric Warfare With An Asymmetric Definition 64 A.F. L. Rev. 65 (2009). Web

BibTeX

Categorization

Key Words

Synopsis

The article will first examine cyberspace and how current approaches have attempted to apply international law to armed attacks in cyberspace. Looking through the lens of current international laws will highlight how the unique attributes of cyberspace could increase the likelihood of international conflict. The article will identify how the failure of international law to define armed attacks and weapons further exacerbates this problem. The article will then transition from current international laws to examine whether current criminal law definitions and methodologies can fill the gap and provide realistic definitions of weapons and armed attacks in cyberspace. Lastly, the article will put these proposed definitions to the test against the most challenging aspects of cyberspace: attribution and espionage.

Additional Notes and Highlights