Acceso abierto

Cyber Operations against Critical Financial Infrastructure: a Non-Destructive Armed Attack?


Cite

Canada. National Strategy for Critical Infrastructure. [online] p. 2. Available at: < https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/srtg-crtcl-nfrstrctr-eng.pdf> Accessed: 22. 10. 2022.10.55535/RMT.2022.3.01 Search in Google Scholar

CARTOON NETWORK STUDIOS. Rick and Morty: The Rickshank Rickdemption. Burbank, USA: Cartoon Network Studios, 2017. Also available on Youtube.com at <https://www.youtube.com/watch?v=mweTc7tDO3I&ab_channel=AlephNull>. Accessed: 22. 10. 2022. Search in Google Scholar

Commission of the European Communities. Green Paper on a European Programme for Critical Infrastructure Protection. [online] p. 24. Available at: < https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52005DC0576&from=EN> Accessed: 22. 10. 2022. Search in Google Scholar

Department of Defense of the United States of America. Cyberspace Policy Report. [online] p. 4. Available at: < https://irp.fas.org/eprint/dod-cyber.pdf > Accessed: 22. 10. 2022. Search in Google Scholar

Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace. [online] p. 1–2. Available at: < https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf > Accessed: 22. 10. 2022. Search in Google Scholar

FARER, Tom, J. Political and Economic Coercion in Contemporary International Law. American Journal of International Law, 1985, vol. 79, no. 2, pp. 405–413.10.2307/2201710 Search in Google Scholar

Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace. [online] p. 4. Available at: <https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf> Accessed: 22. 10. 2022. Search in Google Scholar

FERNICOLA, Gia. Once Upon a Time in Cyberspace: A Grim Reality About the Dangers of Cyberwarfare. International Comparative and Law Review, 2020, vol. 20, no. 1, p. 81.10.2478/iclr-2020-0004 Search in Google Scholar

Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement. [online] Available at: < https://www.gov.uk/government/publications/application-of-international-lawto-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement> Accessed: 22. 10. 2022. Search in Google Scholar

France. International Law Applied to Operations in Cyberspace. [online] p. 5. Available at: < https://documents.unoda.org/wp-content/uploads/2021/12/French-position-on-international-law-applied-to-cyberspace.pdf> Accessed: 22. 10. 2022. Search in Google Scholar

Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace. [online] pp. 8–9. Available at: <https://www.government.nl/binaries/government/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace/International+Law+in+the+Cyberdomain+-+Netherlands.pdf> Accessed 22. 10. 2022. Search in Google Scholar

GRAHAM, David, E. Cyber Threats and the Law of War. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 91. Search in Google Scholar

HATHAWAY, Oona, CROOTOF, Rebecca, LEVITZ, Philip, NIX, Haley, NOWLAN, Aileen, PERDUE, William, SPIEGEL, Julia. The Law of Cyber-Attack. California Law Review, 2012, vol. 100, no. 4, p. 845. Search in Google Scholar

Charter of the United Nations. Search in Google Scholar

Italy. Italian Position Paper on ‘International Law and Cyberspace‘. [online] p. 9. Available at < https://www.esteri.it/mae/resource/doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdf> Accessed: 22. 10. 2022. Search in Google Scholar

KILOVATY, Ido. Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare Towards a Broader Scope of Article 2(4) of the UN Charter. Journal of Law and Cyber Warfare, 2015, vol. 4, no. 3, p. 215. Search in Google Scholar

LIN, Herbert. Offensive Cyber Operations and the Use of Force. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 74. Search in Google Scholar

LOTRIONTE, Catherine. Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law. The Cyber Defense Review, 2018, vol. 3, no. 2, p. 89. Search in Google Scholar

NGUYEN, Reese. Navigating Jus Ad Bellum in the Age of Cyber Warfare. California Law Review, 2013, vol. 101, no. 4, p. 1117. Search in Google Scholar

PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for Federal Government to Protect Critical Infrastructure from Cyber Warfare. Journal of Law and Cyber Warfare, 2012, vol. 1, no. 1, p. 124. Search in Google Scholar

Protiviti. China’s Cybersecurity Law: Critical Information Infrastructure. [online]. Available at: < https://www.protiviti.com/AU-en/insights/pov-critical-information-infrastructure#:~:text=According%20to%20the%20Cybersecurity%20Law,compromised%20network%2C%20or%20system%20malfunction> Accessed: 22. 10. 2022. Search in Google Scholar

PURSIAINEN, Christer. Russia’s Critical Infrastructure Policy: What dowe Know About it? European Journal for Security Research, 2021, vol. 6, no. 1, p. 29.10.1007/s41125-020-00070-0 Search in Google Scholar

ROSCINI, Marco. Cyber Operations and the Use of Force in International Law. 1st ed. New York: Oxford University Press, 2016, p. 74. Search in Google Scholar

SIMMA, Bruno et al. (Eds.) The Charter of the United Nations: A Commentary. 3rd ed. Oxford: Oxford University Press, 2012, p. 208. Search in Google Scholar

SHARP, Walter, Gary. Cyberspace and the Use of Force. Ageis Research Corp, 1999, pp. 129–133. Search in Google Scholar

SCHMITT, Michael, BILLER, Jeffrey. The NotPetya Cyber Operation as a Case Study of International Law. [online] Available at: <https://www.ejiltalk.org/the-notpetyacyber-operation-as-a-case-study-of-international-law/> Accessed: 22. 10. 2022. Search in Google Scholar

SCHMITT, Michael, N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press, 2017.10.1017/9781316822524 Search in Google Scholar

SCHMITT, Michael, N. The Law of Cyber Warfare: Quo Vadis? Stanford Law and Policy Review, 2014, vol. 25, no. 1, p. 283. Search in Google Scholar

SCHMITT, N. Michael. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 1999, vol. 37, pp. 914–915.10.21236/ADA471993 Search in Google Scholar

The Federal Government of Germany. On the Application of International Law in Cyberspace. [online] p. 14–15. Available at: <https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b74fb17204c54665bdf0/on-the-application-of-international-lawin-cyberspace-data.pdf> Accessed 22. 10. 2022. Search in Google Scholar

United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266. 13 July 2021, UN Doc. A/76/136 [online] p. 30. Available at: < https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdf> Accessed: 22. 10. 2022. Search in Google Scholar

VALUCH, Jozef, HAMUĽÁK, Ondrej. Use of Force in Cyberspace. International and Comparative Law Review, 2020, vol. 20, no. 2, p. 182.10.2478/iclr-2020-0023 Search in Google Scholar

WAXMAN, Matthew, C. Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4). The Yale Journal of International Law, 2011, vol. 36, no. 1, p. 436.10.2139/ssrn.1674565 Search in Google Scholar

White House. Presidential Policy Directive – Critical Infrastructure Security and Resilience. [online] Available at: < https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-andresil> Accessed 22. 10. 2022. Search in Google Scholar

eISSN:
2464-6601
Idioma:
Inglés