This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
Abrams, Abigail. Here’s What We Know So Far About Russia’s 2016 Meddling. (18 April 2019) // https://time.com/5565991/russia-influence-2016-electionSearch in Google Scholar
Anderson, Troy. “Fitting a Virtual Peg into a Round Hole: Why Existing International Law Fails to Govern Cyber Reprisals.” Arizona Journal of International & Comparative Law 34 (2016): 144.Search in Google Scholar
Banks, William C. “The Bumpy Road to a Meaningful International Law of Cyber Attribution.” AJIL Unbound 113 (2019): 194.Search in Google Scholar
Barnes, Julian E. Begins First Cyberoperation Against Russia Aimed at Protecting Elections (23 October 2018) // https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.htmlSearch in Google Scholar
BBC. US imposes new Russia sanctions over cyber-attacks. (11 June 2018) // https://www.bbc.com/news/world-us-canada-44446449Search in Google Scholar
Braverman, Suella. International Law in Future Frontiers: The Attorney General, the Rt Hon Suella Braverman QC MP, this evening set out in more detail the UK’s position on applying international law to cyberspace. (19 May 2022) // https://www.gov.uk/government/speeches/international-law-in-future-frontiersSearch in Google Scholar
Case Concerning Military and Paramilitary Activities in and against Nicaragua (Nica ragua v. United States of America). International Court of Justice (Judgement of 27 June 1986), para. 244–245.Search in Google Scholar
Chesney, Robert. The 2018 DOD Cyber Strategy: Understanding ‘Defense Forward’ in Light of the NDAA and PPD-20 Changes. (25 September 2018) // https://www.lawfareblog.com/2018-dod-cyber-strategy-understanding-defense-forward-light-ndaa-and-ppd-20-changesSearch in Google Scholar
Council Decision 2019/797 of 17 May 2019, concerning restrictive measures against cyber-attacks threatening the Union or its Member States.Search in Google Scholar
Council of the European Union. Draft implementing guidelines for the Framework on a Joint EU Diplomatic Response to Malicious Cyber Activities of 9 October 2017 // https://data.consilium.europa.eu/doc/document/ST-13007-2017-INIT/en/pdfSearch in Google Scholar
Council Regulation (EU) 2019/796 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States.Search in Google Scholar
Council of the European Union. Council Conclusions On A Framework For A Joint EU Diplomatic Response To Malicious Cyber Activities (Cyber Diplomacy Toolbox) of 19 June 2017 // https://data.consilium.europa.eu/doc/document/ST-10474-2017-INIT/en/pdfSearch in Google Scholar
Dawidowicz, Martin. Third-Party Countermeasures in International Law. New York: Cambridge University Press, 2017, 29.Search in Google Scholar
Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace //https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdfSearch in Google Scholar
Dohnalová, Anna, and Radek Bartoníček. Ukrajinských hrdinů. Praha přejmenovala část ulice Korunovační u ruské ambasády. (22 April 2022) // https://zpravy.aktualne.cz/regiony/praha/ukrajinskych-hrdinu-praha/r~92302b02c21411ec8a24ac1f6b220ee8/Search in Google Scholar
Duguin, Stéphane, Pavlina Pavlova. The role of cyber in the Russian war against Ukraine: Its impact and the consequences for the future of armed conflict. (September 2023) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdfSearch in Google Scholar
Egan, Brian J. International Law and Stability in Cyberspace. (10 November 2016) // https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdfSearch in Google Scholar
European Parliamentary Research Service. Understanding the EU’s Approach to Cyber Diplomacy and Cyber Defence. (May 2020) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651937/EPRS_BRI(2020)651937_EN.pdfSearch in Google Scholar
European Union External Action. EU imposes first ever cyber sanctions to protect itself from cyber-attacks. (30 July 2020) // https://www.eeas.europa.eu/eeas/eu-imposes-first-ever-cyber-sanctions-protect-itself-cyber-attacks_enSearch in Google Scholar
Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace // https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdfSearch in Google Scholar
Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement //https://www.gov.uk/government/publications/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statementSearch in Google Scholar
Grant, John P., and Craig J. Barker. Parry & Grant encyclopaedic dictionary of international law. New York: Oxford University Press, 2009, 525.Search in Google Scholar
Giegerich, Thomas. “Retorsion”. In: Rüdiger Wolfrum, ed., Max Planc Encyclopedia of Public International Law. Oxford: OUP, 2017.Search in Google Scholar
Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace //https://www.government.nl/binaries/government/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace/International+Law+in+the+Cyberdomain+-+Netherlands.pdfSearch in Google Scholar
Haataja, Samuli. Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics. Oxfordshire: Routledge, 2020, 180–181.Search in Google Scholar
International Law Commission. Yearbook of the International Law Commission: Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries. Vol. II, part two (2001): 71–86 (hereinafter also ARSIWA).Search in Google Scholar
Jibilian, Isabella, and Katie Canales. The US is readying sanctions against Russia over the SolarWinds cyber attack. Here’s a simple explanation of how the massive hack happened and why it’s such a big deal. (15 April 2021) // https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12Search in Google Scholar
Kosseff, Jeff. “Retorsion as a Response to Ongoing Malign Cyberoperations”: 15. In: T. Jančárková, L., Lindström, M., Signoretti, I., Tolga, G., Visky, eds., 2020 12th International Conference on Cyber Conflict. Tallinn: NATO CCDCOE Publications, 2020.Search in Google Scholar
Lahmann, Henning. Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution. Cambridge: Cambridge University Press, 2020.Search in Google Scholar
Lotrionte, Catherine. “Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law.” The Cyber Defense Review 3 (2018): 92.Search in Google Scholar
McDonald, Neil, and Anna McLeod. “Antisocial Behaviour, Unfriendly Relations: Assessing the Contemporary Value of the Categories of Unfriendly Acts and Retorsion in International Law.” Journal of Conflict & Security Law 26 (2021): 423.Search in Google Scholar
Morello, Carol, and Ellen Nakashima. U.S. imposes sanctions on North Korean hackers accused in Sony attack, dozens of other incidents. (13 September 2019) // https://www.washingtonpost.com/national-security/us-sanctions-north-korean-hackers-accused-in-sony-attack-dozens-of-other-incidents/2019/09/13/ac6b0070-d633-11e9-9610-fb56c5522e1c_story.htmlSearch in Google Scholar
Moret, Erica, and Patryk Pawlak. The EU Cyber Diplomacy Toolbox: towards a cyber sanctions regime? (12 July 2017) // https://www.iss.europa.eu/content/eu-cyber-diplomacy-toolbox-towards-cyber-sanctions-regimeSearch in Google Scholar
Nakashima, Ellen, and Paul Sonne. U.S. military carried out secret cyberstrike on Iran to prevent it from interfering with shipping. (28 August 2019) // https://www.washingtonpost.com/national-security/us-military-carried-out-secret-cyber-strike-on-iran-to-prevent-it-from-interfering-with-shipping/2019/08/28/36202a4e-c9db-11e9-a1fe-ca46e8d573c0_story.htmlSearch in Google Scholar
Roguski, Przemyslaw. Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views //https://ruj.uj.edu.pl/xmlui/bitstream/handle/item/153989/roguski_application_of_international_law_to_cyber_operations_2020.pdf?sequence=1&isAllowed=ySearch in Google Scholar
Ruys, Tom. “Sanctions, Retorsions and Countermeasures: Concepts and International Legal Framework”: 24. In: Larissa van den Herik, ed., Research Handbook on UN Sanctions and International Law. Cheltenham: Edward Elgar Publishing, 2017.Search in Google Scholar
Sanger, David E. Obama Strikes Back at Russia for Election Hacking. (29 December 2016) // https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.htmlSearch in Google Scholar
Schmitt, Michael N. “The Law of Cyber Warfare: Quo Vadis?” Stanford Law and Policy Review 25 (2014): 287.Search in Google Scholar
Schmidt, Julia. “The Legality of Unilateral Extra-territorial Sanctions under International Law.” Journal of Conflict & Security Law 27 (2022): 73.Search in Google Scholar
Schmitt, Michael N., et al. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013, 40.Search in Google Scholar
Schmitt, Michael N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017, 82.Search in Google Scholar
Schmitt, Michael N. “Below the Threshold Cyber Operations: The Countermeasures Response Option and International Law.” Virginia Journal of International Law 54 (2015): 701.Search in Google Scholar
Schmitt, Michael N. “Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: an Analytical Vade Mecum.” Harvard National Security Journal 8 (2017).Search in Google Scholar
Schmitt, Michael N. Terminological Precision And International Cyber Law. (29 July 2021) // https://lieber.westpoint.edu/terminological-precision-international-cyber-lawSearch in Google Scholar
Spáčil, Jakub. “Plea of Necessity: Legal Key to Protection Against Unattributable Cyber Operations.” Masaryk University Journal of Law and Technology 16 (2022): 218.Search in Google Scholar
Spáčil, Jakub. “Animus Aggressionis: The Role Of Intent in the Analysis of Armed Attack in Cyberspace.” Czech Yearbook of Public & Private International Law 13 (2022): 58–59.Search in Google Scholar
The Federal Government of Germany. On the Application of International Law in Cyberspace //https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b-74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdfSearch in Google Scholar
The NATO Cooperative Cyber Defence Centre of Excellence. CCDCOE to Host the Tallinn Manual 3.0 Process. // https://ccdcoe.org/news/2020/ccdcoe-to-host-thetallinn-manual-3-0-process/Search in Google Scholar
The NATO Cooperative Cyber Defence Centre of Excellence. European Union Equipping Itself against Cyber Attacks with the Help of Cyber Diplomacy Toolbox // https://ccdcoe.org/incyder-articles/european-union-equipping-itself-against-cyber-attacks-with-the-help-of-cyber-diplomacy-toolbox/Search in Google Scholar
The White House. Fact Sheet: Actions in Response to Russian Malicious Cyber Activity and Harassment. (29 December 2016) // https://obamawhitehouse.archives.gov/the-press-office/2016/12/29/fact-sheet-actions-response-russian-malicious-cyber-activity-andSearch in Google Scholar
U. S. Department of State. Holding Russia To Account. (15 April 2021) // https://www.state.gov/holding-russia-to-account/Search in Google Scholar
U.S. Department of the Treasury. Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks. (15 March 2018) // https://home.treasury.gov/news/press-releases/sm0312Search in Google Scholar
U.S. Department of the Treasury. Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. (13 September 2019) // https://home.treasury.gov/news/press-releases/sm0312Search in Google Scholar
UN General Assembly Resolution 2625 from 24 October 1970. “The Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States”.Search in Google Scholar
United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266 of 13 July 2021, UN Doc. A/76/136. // https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdfSearch in Google Scholar
Valuch, Jozef, and Ondrej Hamuľák. “Use of Force in Cyberspace.” International and Comparative Law Review 20 (2020): 174–191.Search in Google Scholar
von Heinegg, Wolff Heintschel. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89 (2013): 123.Search in Google Scholar
Wallace, David, and Marc Visger. “The Use of Weaponized “Honeypots” under the Customary International Law of State Responsibility.” Cyber Defense Review 3 (2018): 38.Search in Google Scholar