Uneingeschränkter Zugang

The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century


Zitieren

1. Albright, David, Paul Brannan, and Christina Walrond. “Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?” Institute for Science and International Security Report (December 22, 2010): 1–10 // http://isis-online.org/uploads/isis-reports/documents/stuxnet_FEP_22Dec2010.pdf.10.1016/S1353-4858(10)70121-5Search in Google Scholar

2. Anderson, Michael. “Reconceptualizing Aggression.” Duke Law Journal 60 (2010): 411–456.Search in Google Scholar

3. Antolin-Jenkins, Vida M. “Defining the Parameters of Cyber War Operations: Looking for Law in All the Wrong Places?” Naval Law. Rev. 51 (2005): 132–169.Search in Google Scholar

4. Baker, Stewart, McAfee, Inc. “In the Crossfire: Critical Infrastructure in the Age of Cyber War” (2009) // http://newsroom.mcafee.com/images/10039/In%20the%20Crossfire_CIP%20report.pdf.Search in Google Scholar

5. Barkham, Jason. “Information Warfare and International Law on the Use of Force.” N.Y.U. J. Int’l L. & Pol. 34 (2001): 57–114.Search in Google Scholar

6. Billo, Charles G., and Welton Chang. Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States. Institute for Security Technology Studies, 2004.Search in Google Scholar

7. Blank, Laurie R. “Taking Distinction to the Next Level: Accountability for Fighters’ Failure to Distinguish Themselves from Civilians.” Valparaiso University Law Review 46(3) (2012): 745–887.Search in Google Scholar

8. Brenner, Susan W. “Is There Such a Thing as ‘Virtual Crime’?” Cal. Crim. L. Rev. 4 (2001): 1-18.Search in Google Scholar

9. Brenner, Susan W. and Leo L. Clarke, “Civilians in Cyber Warfare: Conscripts,” Vanderbilt Journal of Transnational Law 43 (2010): 1011-1076.Search in Google Scholar

10. Brenner, Susan. “At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare.” J. Crim. Law & Criminology 97 (2007): 363–381.Search in Google Scholar

11. Brown, Davis. “Use of Force Against Terrorism After September 11th: State Responsibility, Self-Defense and Other Responses.” Cardozo J. of Int'l & Comp. Law 11 (2003): 1-57.Search in Google Scholar

12. Cannizzaro, Enzo. “Contextualizing Proportionality: Jus Ad Bellum and Jus in Bello in the Lebanese War.” Int’l Rev. Red Cross 88 (864), 779 (2006): 779–827.10.1017/S1816383107000896Search in Google Scholar

13. Carnahan, Burrus M. “Lincoln, Lieber and the Laws of War: The Origins and Limits of the Principle of Military Necessity.” Am. J. Int’l L. 92 (1998): 213–248.10.2307/2998030Open DOISearch in Google Scholar

14. Carr, Jeffrey. Inside Cyber Warfare. CA: O’Reilly Media Inc., 2010.Search in Google Scholar

15. Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to do About it. New York: Ecco, 2010.Search in Google Scholar

16. Coleman, Kevin. “The Cyber Arms Race Has Begun.” CSO Online (January 28, 2008) // http://www.csoonline.com/article/print/216991.Search in Google Scholar

17. Condron, Sean. “Getting It Right: Protecting American Critical Infrastructure in Cyberspace.” Harv. J.L. & Tech. 20 (2007): 403–422.Search in Google Scholar

18. Creekman, Daniel M. “A Helpless America? An Examination of the Legal Options Available to the United States in Response to Various Cyber-attacks from China.” Am. U. Int’l L. Rev. 17 (2002): 641–689.Search in Google Scholar

19. Darcy, Shane. “Assistance, Direction and Control: Untangling International Judicial Opinion on Individual and State Responsibility for War Crimes by Non-state Actors.” International Review of the Red Cross 96(893) (2014): 259–261.10.1017/S1816383115000119Search in Google Scholar

20. DeLuca, Christopher D. “The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors.” Pace Int’l L. Rev. Online Companion 3 (2013): 278–329.Search in Google Scholar

21. Dinstein, Yoram. “Computer Network Attacks and Self-Defense”: 99–120. In: Michael N. Schmitt and Brian T. O’Donnell, eds. Computer Network Attack and International Law. Naval War College, International Law Studies, vol.76, 2002.Search in Google Scholar

22. DOD Dictionary of Military and Associated Terms (2001) // http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf.Search in Google Scholar

23. Dombrowski, Peter, and Chris C. Demchak. “Cyber War, Cybered Conflict, and the Maritime Domain.” Naval War College Review 67(2) (2014): 45–93.Search in Google Scholar

24. Dormann, Knut. “Applicability of the Additional Protocols to Computer Network Attacks.” Int'l Committee of the Red Cross (November 19, 2004) // http://www.icrc.org/eng/assets/files/other/applicabilityofihltocna.pdf.Search in Google Scholar

25. Estreicher, Samuel. “Privileging Asymmetric Warfare (Part II)?: The ‘Proportionality’ Principle under International Humanitarian Law.” Chi. J. Int’l L. 12 (2011): 1–143.Search in Google Scholar

26. Franzese, Patrick W. “Sovereignty in Cyberspace: Can It Exist?” A.F. L. REV. 64 (2009): 1–54.Search in Google Scholar

27. Gercke, Marco. Understanding Cybercrime: Phenomena, Challenges and Legal Response. ITU: Telecommunication Development Bureau, 2012.Search in Google Scholar

28. German Federal Ministry of the Interior. Cyber Security Strategy for Germany. Berlin: Beauftragter der Bundesregierung für Informationstechnik, 2011.Search in Google Scholar

29. Goodman, Ryan, and Derek Jinks, “The ICRC Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law: An Introduction to the Forum.” NYU J Intl L Pol. 42 (2010): 637–640.Search in Google Scholar

30. Gordon, Sarah, and Richard Ford. “On the Definition and Classification of Cybercrime.” J. Computer Virology 1 (2006): 1–17.10.1007/s11416-006-0015-zSearch in Google Scholar

31. Graham, David E. “Cyber Threats and the Law of War.” Journal of National Security Law & Policy 4 (2010): 87–134.Search in Google Scholar

32. Halberstam, Manny. “Hacking Back: Re-evaluating the Legality of Retaliatory Cyber-attacks.” The Geo. Wash. Int'l L. Rev. 46 (2013): 199–258.Search in Google Scholar

33. Hathaway, Melissa E., and Alexander Klimburg. “Preliminary Considerations: On National Cyber Security”: 1–43. In: Alexander Klimburg, ed. National Cyber Security Framework Manual. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, Estonia Publication, 2012.Search in Google Scholar

34. Hathaway, Oona, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, and Julia Spiegel. “The Law of Cyber-Attack.” Calif. L. Rev. 100 (2012): 817–886.Search in Google Scholar

35. Heinsch, Robert. “The Crime of Aggression After Kampala: Success or Burden for the Future?” Goettingen Journal of International Law 2 (2010): 709–763.Search in Google Scholar

36. Henckaerts, Jean-Marie, and Louise Doswald-Beck. Customary International Humanitarian Law. ICRC, 2005.10.1017/CBO9780511804700Search in Google Scholar

37. Hildreth, Steven A. “Cyber Warfare.” Cong. Research Serv., CRS Report for Congress (2001): 1–29.Search in Google Scholar

38. Hoisington, Matthew. “Cyber Warfare and the Use of Force Giving Rise to the Right of Self-Defense.” B.C. Int'l & Comp. L. Rev. 32 (2009): 439–481.10.2139/ssrn.1542223Search in Google Scholar

39. Hollis, Duncan B. “Why States Need an International Law for Information Operations.” Lewis & Clark Law. Review 11 (2007): 1023–1093.Search in Google Scholar

40. Hurka, Thomas. “Proportionality in the Morality of War.” Philo & Pub Aff. 33 (2005): 34–72.10.1111/j.1088-4963.2005.00024.xSearch in Google Scholar

41. ICRC. “Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law.” Intl Rev Red Cross 90 (2008): 987–1026.10.1017/S1816383109000319Search in Google Scholar

42. Jensen, Eric. “Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense.” Stan. J. Int’l Law 38 (2002): 207–240.Search in Google Scholar

43. Jensen, Eric. “Unexpected Consequences from Knock-On Effects: A Different Standard for Computer Network Operations?” Am. U. Int’l L. Rev. 18 (2003): 1168–1197.Search in Google Scholar

44. Kalpokienė, Julija, and Ignas Kalpokas. “Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control.” Baltic Journal of Law & Politics 5:2 (2012): 132–163.10.2478/v10076-012-0014-ySearch in Google Scholar

45. Kastenberg, Joshua E. “Non-intervention and Neutrality in Cyberspace: An Emerging Principle in the National Practice of International Law.” A.F. L. Rev. 64 (2009): 1–68.Search in Google Scholar

46. Kelsey, Jeffrey T.G. “Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare.” Mich. L. Rev. 106 (2008): 1431–1468.Search in Google Scholar

47. Kerschischnig, Georg. Cyber Threats and International Law. Eleven International Publishing, 2012.Search in Google Scholar

48. Kingsbury, Alex. “Documents Reveal Al Qaeda Cyber-attacks.” U.S. News (April 14, 2010) // http://www.usnews.com/news/articles/2010/04/14/documentsreveal-al-qaeda-cyberattacks.Search in Google Scholar

49. Landau, Susan. “National Security on the Line.” Journal of Telecomm. & High Tech. Law 4 (2006): 409–447.Search in Google Scholar

50. Libicki, Martin C. “What is Information Warfare?” Strategic Forum No. 28 (1995): 1–3.10.1016/B978-1-55558-131-2.50010-2Search in Google Scholar

51. Little, Debra, John Shinder, and Ed Tittel. Scene of the Cybercrime: Computer Forensics Handbook. (MA: Syngress Publishing, Inc. Rockland, 2002).Search in Google Scholar

52. Lülf, Charlotte. “Modern Technologies and Targeting under International Humanitarian Law.” IFHV Working Paper Vol. 3, No. 3 (December 2013): 39–45 // http://www.ruhr-uni-bochum.de/ifhv/documents/workingpapers/wp3_3.pdf.Search in Google Scholar

53. Melzer, Nil. “Keeping the Balance between Military Necessity and Humanity: A Response to Four Critiques of the ICRC’s Interpretive Guidance on the Notion of Direct Participation in Hostilities.” Int’l L. & Pol. 42 (2010): 831–877.Search in Google Scholar

54. Melzer, Nils. “Cyber Operations and Jus in Bello.” Disarmament Forum (2011).Search in Google Scholar

55. Murphy, Matt, “War in the Fifth Domain: Are the Mouse and Keyboard the New Weapons of Conflict?” Economist (July 1, 2010).Search in Google Scholar

56. Owens, William A., Kenneth W. Dam, and Herbert S. Lin, eds. Technology, Policy, Law, and Ethics Regarding US Acquisition and Use of Cyber-attack Capabilities. National Research Council Report, 2009.Search in Google Scholar

57. Printer, Norman G., Jr. “The Use of Force against Non-State Actors under International Law: An Analysis of the U.S. Predator Strike in Yemen.” UCLA J. Int'l L. & Foreign Aff. 8 (2003): 331–392.Search in Google Scholar

58. Proulx, Vincent-Joel. “Babysitting Terrorists: Should States Be Strictly Liable for Failing to Prevent Transborder Attacks?” Berkeley J. Int’l L. 23 (2005): 616–667.Search in Google Scholar

59. Rollins, John W., and Catherine A. Theohary. Cyber warfare and Cyber terrorism: In Brief (Congressional Research Service (CRS) Report, R43955, March 27, 2015).Search in Google Scholar

60. Sandoz, Yves, Christophe Swinarski, and Bruno Zimmermann, eds. Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. ICRC, 1987.Search in Google Scholar

61. Schaap, Arie J. “Cyber Warfare Operations: Development and Use under International Law.” A.F. L. Rev. 64 (2009): 121–161.Search in Google Scholar

62. Schindler, Dietrich, and Jiri Toman, eds. The Laws of Armed Conflicts: A Collection of Conventions, Resolutions and Other Documents. 4th ed. (Boston: Martinus Nijhoff Publishers, 2004.10.1163/9789047405238Search in Google Scholar

63. Schmitt, Michael N. “‘Attack’ as a Term of Art in International Law: The Cyber Operations Context”: 283–293. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.Search in Google Scholar

64. Schmitt, Michael N. “Military Necessity and Humanity in International Humanitarian Law: Preserving the Delicate Balance.” Virginia Journal of International Law 50(4) (2010): 761–799.Search in Google Scholar

65. Schmitt, Michael N. “Rewired Warfare: Rethinking the Law of Cyber Attack.” Int’l Rev. Red Cross 96(893) (2014): 182–205.10.1017/S1816383114000381Search in Google Scholar

66. Schmitt, Michael N. “The Impact of High Tech and Low Tech Warfare on Distinction”: 169–189. In: Roberta Arnold and Pierre-Antoine Hildbrand, eds. International Humanitarian Law and the 21st Century’s Conflicts: Changes and Challenge. Lausanne: Ed. Interuniversitaires Suisses-Edis, 2005.Search in Google Scholar

67. Schmitt, Michael N. “Wired Warfare: Computer Network Attack and Jus in Bello.” Int'l Rev. of the Red Cross 84 (2002): 365–399.10.1017/S1560775500097741Search in Google Scholar

68. Schmitt, Michael N., ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.10.1017/CBO9781139169288Search in Google Scholar

69. Schmitt, Michael N., Harrison A. Dinniss, and Thomas C. Wingfield. “Computers and War: The Legal Battle Space.” Background Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law. Cambridge (June 25–27, 2004).Search in Google Scholar

70. Schmitt, Michael. “Pre-emptive Strategies in International Law.” Mich. J. Int’l Law 24 (2003): 534–569.Search in Google Scholar

71. Shane, Harris, “The Cyber war Plan,” National Journal (November 14, 2009) // http://www.nationaljournal.com/njmagazine/cs_20091114_3145.php.Search in Google Scholar

72. Sharp, Walter Gary. Cyberspace and the Use of Force. Virginia, Falls Church: Aegis Research Corporation, 1999.Search in Google Scholar

73. Shimeall, Timothy, Phil Williams, and Casey Dunlevy. “Countering Cyber War.” NATO Rev. 49 (2001): 16–19.Search in Google Scholar

74. Sklerov, Matthew J. “Solving the Dilemma of State Responses to Cyber-attacks: A Justification for the Use of Active Defenses against States Which Neglect Their Duty to Prevent.” Mil. L. Rev. 201 (2009): 1–85.Search in Google Scholar

75. Smith, Gerry. “UK Authorities Brace for ‘Cyber Jihad’ By Al Qaeda after Bin Laden Death.” The Huffington Post (July 12, 2011) // http://www.huffingtonpost.com/2011/07/12/al-qaeda-cyberjihad_n_895579.html.Search in Google Scholar

76. Solce, Natasha. “The Battlefield of Cyber Space: The Inevitable New Military Branch – The Cyber Force.” Alb. L.J. Sci. & Tech. 18 (2008): 292–336.Search in Google Scholar

77. Stevens, Sharon R. “Internet War Crimes Tribunals and Security in an Interconnected World.” Transnat’l L. & Contemp. Probs. 18 (2009): 657–676.Search in Google Scholar

78. Svarc, Dominika. “Redefining Imminence: The Use of Force Against Threats and Armed Attacks in the Twenty-First Century.” ILSA J. Int’l & Comp. L. 13 (2006): 171–219.Search in Google Scholar

79. Swanson, Lesley. “The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict.” L.A. Int’l & Comp. L. Rev. 32 (2010): 303–353.Search in Google Scholar

80. Teo, Cheng Hang. “The Acme of Skill: Non-Kinetic Warfare.” Air Command & Staff Coll., Wright Flyer Paper No. 30 (2008) // http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA485268&Location=U2&doc=GetTRDoc.pdf.Search in Google Scholar

81. Turns, David. “Cyber Warfare and the Notion of Direct Participation in Hostilities.” Journal of Conflict & Security Law (2012): 279–297.10.1093/jcsl/krs021Search in Google Scholar

82. U.K. Cabinet Office. The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World (November 2011) // https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf.Search in Google Scholar

83. U.K. Ministry of Defence. The Joint Service Manual of the Law of Armed Conflict. 3. Wiltshire: The Joint Doctrine and Concepts Centre, UK, 2004.Search in Google Scholar

84. U.K. Secretary of State for the Home Dep’t. Contest: The United Kingdom’s Strategy for Countering Terrorism. Her majesty’s Stationary Office (July 2011) // https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97995/strategy-contest.pdf.Search in Google Scholar

85. US Army Training & Doctrine Command, DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism: Cyber Operations and Cyber Terrorism Handbook. 2005.Search in Google Scholar

86. US Department of Defense (DOD). “Memorandum for Chiefs of the Military Services, Commanders of the Combatant Commands, Dirs. of the Joint Staff Directories – Joint Terminology for Cyberspace Operations” (November 2011): 1-16 // http://www.nsci-va.org/CyberReferenceLib/2010-11-joint%20Terminology%20for%20Cyberspace%20Operations.pdf.Search in Google Scholar

87. US Department of Defense (DOD). “Quadrennial Defense Review” (2010).10.21236/ADA513713Search in Google Scholar

88. US Department of Defense (DOD). “Strategy for Operating in Cyberspace” (July 2011).Search in Google Scholar

89. US White House. The National Strategy to Secure Cyberspace (2003) // http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf.Search in Google Scholar

90. Vatis, Michael A. “Cyber Attacks during the War on Terrorism: A Predictive Analysis.” Institute for Security Technology Studies at Dartmouth College, Report OMB No. 074-0188 (September 2001).10.21236/ADA386280Search in Google Scholar

91. Waxman, Matthew C. “Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4).” Yale Journal of International Law 36 (2011): 411–452.10.2139/ssrn.1674565Search in Google Scholar

92. Wedgwood, Ruth. “Proportionality, Cyber war and the Law of War”: 219–254. In: Michael N. Schmitt and Brian T. O’Donnell, eds. Computer Network Attack and International Law. Naval War College, International Law Studies, vol.76, 2002.Search in Google Scholar

93. Wheeler, David, and Gregory Larsen. “Techniques for Cyber Attack Attribution.” Inst. Def. Analysis (October 2003): 23–25 //http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA468859&Location=U2&doc=GetTRDoc.pdf.10.21236/ADA468859Search in Google Scholar

94. Wingfield, Thomas. The Law of Information Conflict: National Security Law in Cyberspace. Texas: Aegis Research Corp, 2000.Search in Google Scholar

1. Advisory Opinion on the Legality of the Threat or Use of Nuclear Weapons. 1996 I.C.J. para. 79 (July 8).Search in Google Scholar

2. Combating the Criminal Misuse of Information Technologies. G.A. Res. 55/63, paras.1,3 U.N. Doc. A/RES/55/63 (Jan. 22, 2001).10.1007/978-3-540-45359-8_7Search in Google Scholar

3. Convention on Cybercrime. Council of Europe, Nov. 23, 2001, 41 I.L.M. 282, 2296 U.N.T.S. 167.10.1017/S0020782900009918Search in Google Scholar

4. Eighth United Congress on the Prevention of Crime and the Treatment of Offenders. G.A. Res. 45/121, para.3, U.N. Doc. A/RES/45/121 (Dec. 14, 1990).Search in Google Scholar

5. Geneva Convention (III) Relative to the Treatment of Prisoners of War. Aug. 12, 1949, 6 U.S.T. 3316, 75 U.N.T.S. 135.Search in Google Scholar

6. Hague Convention (IV) with Respect to the Laws and Customs of War on Land. Oct. 18, 1907, 36 Stat. 2277, 187 Consol. T.S. 429.Search in Google Scholar

7. Lieber Code, U.S. War Dep’t, General Orders No. 100: Instructions for the Government of Armies of the United States in the Field (April 24, 1863).Search in Google Scholar

8. Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. U.S.). 1984 I.C.J. Rep. 392.Search in Google Scholar

9. Prosecutor v. Tadić. Case No. IT-94-1-A, I.C.T.Y. App. Ch., at 49 (July 15, 1999).Search in Google Scholar

10. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts. June 8, 1977, 1125 U.N.T.S. 3.Search in Google Scholar

11. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of Non-International Armed Conflicts. June 8, 1977, 1125 U.N.T.S. 3.Search in Google Scholar

12. Review Conference of the Rome Statute of the International Criminal Court. Kampala, Uganda, May 31-Jun. 11, 2010, U.N. Doc. R/Con./Res.6, Annex I.Search in Google Scholar

13. Rome Statute of the International Criminal Court. July 17, 1998, 37 I.L.M. 1002.10.1017/S0020782900012420Search in Google Scholar

14. UN General Assembly, ‘Definition of Aggression’. G.A. Res. 3314, U.N. GAOR, 29th Sess., U.N. Doc. A/RES/3314 (Dec. 14, 1974).Search in Google Scholar

15. US Critical Infrastructure Protection Act of 2001. 42 U.S.C.S. §5195c(e) (2006).Search in Google Scholar

eISSN:
2029-0454
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Rechtswissenschaften, andere, Sozialwissenschaften, Politikwissenschaften, Allgemeines