Accesso libero

Retorsion: An Underrated Retaliatory Measure Against Malign Cyber Operations

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Abrams, Abigail. Here’s What We Know So Far About Russia’s 2016 Meddling. (18 April 2019) // https://time.com/5565991/russia-influence-2016-election Search in Google Scholar

Anderson, Troy. “Fitting a Virtual Peg into a Round Hole: Why Existing International Law Fails to Govern Cyber Reprisals.” Arizona Journal of International & Comparative Law 34 (2016): 144. Search in Google Scholar

Banks, William C. “The Bumpy Road to a Meaningful International Law of Cyber Attribution.” AJIL Unbound 113 (2019): 194. Search in Google Scholar

Barnes, Julian E. Begins First Cyberoperation Against Russia Aimed at Protecting Elections (23 October 2018) // https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html Search in Google Scholar

BBC. US imposes new Russia sanctions over cyber-attacks. (11 June 2018) // https://www.bbc.com/news/world-us-canada-44446449 Search in Google Scholar

Braverman, Suella. International Law in Future Frontiers: The Attorney General, the Rt Hon Suella Braverman QC MP, this evening set out in more detail the UK’s position on applying international law to cyberspace. (19 May 2022) // https://www.gov.uk/government/speeches/international-law-in-future-frontiers Search in Google Scholar

Case Concerning Military and Paramilitary Activities in and against Nicaragua (Nica ragua v. United States of America). International Court of Justice (Judgement of 27 June 1986), para. 244–245. Search in Google Scholar

Chesney, Robert. The 2018 DOD Cyber Strategy: Understanding ‘Defense Forward’ in Light of the NDAA and PPD-20 Changes. (25 September 2018) // https://www.lawfareblog.com/2018-dod-cyber-strategy-understanding-defense-forward-light-ndaa-and-ppd-20-changes Search in Google Scholar

Council Decision 2019/797 of 17 May 2019, concerning restrictive measures against cyber-attacks threatening the Union or its Member States. Search in Google Scholar

Council of the European Union. Draft implementing guidelines for the Framework on a Joint EU Diplomatic Response to Malicious Cyber Activities of 9 October 2017 // https://data.consilium.europa.eu/doc/document/ST-13007-2017-INIT/en/pdf Search in Google Scholar

Council Regulation (EU) 2019/796 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States. Search in Google Scholar

Council of the European Union. Council Conclusions On A Framework For A Joint EU Diplomatic Response To Malicious Cyber Activities (Cyber Diplomacy Toolbox) of 19 June 2017 // https://data.consilium.europa.eu/doc/document/ST-10474-2017-INIT/en/pdf Search in Google Scholar

Dawidowicz, Martin. Third-Party Countermeasures in International Law. New York: Cambridge University Press, 2017, 29. Search in Google Scholar

Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace // https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf Search in Google Scholar

Dohnalová, Anna, and Radek Bartoníček. Ukrajinských hrdinů. Praha přejmenovala část ulice Korunovační u ruské ambasády. (22 April 2022) // https://zpravy.aktualne.cz/regiony/praha/ukrajinskych-hrdinu-praha/r~92302b02c21411ec8a24ac1f6b220ee8/ Search in Google Scholar

Duguin, Stéphane, Pavlina Pavlova. The role of cyber in the Russian war against Ukraine: Its impact and the consequences for the future of armed conflict. (September 2023) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdf Search in Google Scholar

Egan, Brian J. International Law and Stability in Cyberspace. (10 November 2016) // https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf Search in Google Scholar

European Parliamentary Research Service. Understanding the EU’s Approach to Cyber Diplomacy and Cyber Defence. (May 2020) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651937/EPRS_BRI(2020)651937_EN.pdf Search in Google Scholar

European Union External Action. EU imposes first ever cyber sanctions to protect itself from cyber-attacks. (30 July 2020) // https://www.eeas.europa.eu/eeas/eu-imposes-first-ever-cyber-sanctions-protect-itself-cyber-attacks_en Search in Google Scholar

Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace // https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf Search in Google Scholar

Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement // https://www.gov.uk/government/publications/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement Search in Google Scholar

Grant, John P., and Craig J. Barker. Parry & Grant encyclopaedic dictionary of international law. New York: Oxford University Press, 2009, 525. Search in Google Scholar

Giegerich, Thomas. “Retorsion”. In: Rüdiger Wolfrum, ed., Max Planc Encyclopedia of Public International Law. Oxford: OUP, 2017. Search in Google Scholar

Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace // https://www.government.nl/binaries/government/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace/International+Law+in+the+Cyberdomain+-+Netherlands.pdf Search in Google Scholar

Haataja, Samuli. Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics. Oxfordshire: Routledge, 2020, 180–181. Search in Google Scholar

International Law Commission. Yearbook of the International Law Commission: Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries. Vol. II, part two (2001): 71–86 (hereinafter also ARSIWA). Search in Google Scholar

Jibilian, Isabella, and Katie Canales. The US is readying sanctions against Russia over the SolarWinds cyber attack. Here’s a simple explanation of how the massive hack happened and why it’s such a big deal. (15 April 2021) // https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12 Search in Google Scholar

Kosseff, Jeff. “Retorsion as a Response to Ongoing Malign Cyberoperations”: 15. In: T. Jančárková, L., Lindström, M., Signoretti, I., Tolga, G., Visky, eds., 2020 12th International Conference on Cyber Conflict. Tallinn: NATO CCDCOE Publications, 2020. Search in Google Scholar

Lahmann, Henning. Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution. Cambridge: Cambridge University Press, 2020. Search in Google Scholar

Lotrionte, Catherine. “Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law.” The Cyber Defense Review 3 (2018): 92. Search in Google Scholar

McDonald, Neil, and Anna McLeod. “Antisocial Behaviour, Unfriendly Relations: Assessing the Contemporary Value of the Categories of Unfriendly Acts and Retorsion in International Law.” Journal of Conflict & Security Law 26 (2021): 423. Search in Google Scholar

Morello, Carol, and Ellen Nakashima. U.S. imposes sanctions on North Korean hackers accused in Sony attack, dozens of other incidents. (13 September 2019) // https://www.washingtonpost.com/national-security/us-sanctions-north-korean-hackers-accused-in-sony-attack-dozens-of-other-incidents/2019/09/13/ac6b0070-d633-11e9-9610-fb56c5522e1c_story.html Search in Google Scholar

Moret, Erica, and Patryk Pawlak. The EU Cyber Diplomacy Toolbox: towards a cyber sanctions regime? (12 July 2017) // https://www.iss.europa.eu/content/eu-cyber-diplomacy-toolbox-towards-cyber-sanctions-regime Search in Google Scholar

Nakashima, Ellen, and Paul Sonne. U.S. military carried out secret cyberstrike on Iran to prevent it from interfering with shipping. (28 August 2019) // https://www.washingtonpost.com/national-security/us-military-carried-out-secret-cyber-strike-on-iran-to-prevent-it-from-interfering-with-shipping/2019/08/28/36202a4e-c9db-11e9-a1fe-ca46e8d573c0_story.html Search in Google Scholar

Roguski, Przemyslaw. Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views // https://ruj.uj.edu.pl/xmlui/bitstream/handle/item/153989/roguski_application_of_international_law_to_cyber_operations_2020.pdf?sequence=1&isAllowed=y Search in Google Scholar

Ruys, Tom. “Sanctions, Retorsions and Countermeasures: Concepts and International Legal Framework”: 24. In: Larissa van den Herik, ed., Research Handbook on UN Sanctions and International Law. Cheltenham: Edward Elgar Publishing, 2017. Search in Google Scholar

Sanger, David E. Obama Strikes Back at Russia for Election Hacking. (29 December 2016) // https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html Search in Google Scholar

Schmitt, Michael N. “The Law of Cyber Warfare: Quo Vadis?” Stanford Law and Policy Review 25 (2014): 287. Search in Google Scholar

Schmidt, Julia. “The Legality of Unilateral Extra-territorial Sanctions under International Law.” Journal of Conflict & Security Law 27 (2022): 73. Search in Google Scholar

Schmitt, Michael N., et al. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013, 40. Search in Google Scholar

Schmitt, Michael N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017, 82. Search in Google Scholar

Schmitt, Michael N. “Below the Threshold Cyber Operations: The Countermeasures Response Option and International Law.” Virginia Journal of International Law 54 (2015): 701. Search in Google Scholar

Schmitt, Michael N. “Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: an Analytical Vade Mecum.” Harvard National Security Journal 8 (2017). Search in Google Scholar

Schmitt, Michael N. Terminological Precision And International Cyber Law. (29 July 2021) // https://lieber.westpoint.edu/terminological-precision-international-cyber-law Search in Google Scholar

Spáčil, Jakub. “Plea of Necessity: Legal Key to Protection Against Unattributable Cyber Operations.” Masaryk University Journal of Law and Technology 16 (2022): 218. Search in Google Scholar

Spáčil, Jakub. “Animus Aggressionis: The Role Of Intent in the Analysis of Armed Attack in Cyberspace.” Czech Yearbook of Public & Private International Law 13 (2022): 58–59. Search in Google Scholar

The Federal Government of Germany. On the Application of International Law in Cyberspace // https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b-74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdf Search in Google Scholar

The NATO Cooperative Cyber Defence Centre of Excellence. CCDCOE to Host the Tallinn Manual 3.0 Process. // https://ccdcoe.org/news/2020/ccdcoe-to-host-thetallinn-manual-3-0-process/ Search in Google Scholar

The NATO Cooperative Cyber Defence Centre of Excellence. European Union Equipping Itself against Cyber Attacks with the Help of Cyber Diplomacy Toolbox // https://ccdcoe.org/incyder-articles/european-union-equipping-itself-against-cyber-attacks-with-the-help-of-cyber-diplomacy-toolbox/ Search in Google Scholar

The White House. Fact Sheet: Actions in Response to Russian Malicious Cyber Activity and Harassment. (29 December 2016) // https://obamawhitehouse.archives.gov/the-press-office/2016/12/29/fact-sheet-actions-response-russian-malicious-cyber-activity-and Search in Google Scholar

U. S. Department of State. Holding Russia To Account. (15 April 2021) // https://www.state.gov/holding-russia-to-account/ Search in Google Scholar

U.S. Department of the Treasury. Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks. (15 March 2018) // https://home.treasury.gov/news/press-releases/sm0312 Search in Google Scholar

U.S. Department of the Treasury. Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. (13 September 2019) // https://home.treasury.gov/news/press-releases/sm0312 Search in Google Scholar

UN General Assembly Resolution 2625 from 24 October 1970. “The Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States”. Search in Google Scholar

United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266 of 13 July 2021, UN Doc. A/76/136. // https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdf Search in Google Scholar

Valuch, Jozef, and Ondrej Hamuľák. “Use of Force in Cyberspace.” International and Comparative Law Review 20 (2020): 174–191. Search in Google Scholar

von Heinegg, Wolff Heintschel. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89 (2013): 123. Search in Google Scholar

Wallace, David, and Marc Visger. “The Use of Weaponized “Honeypots” under the Customary International Law of State Responsibility.” Cyber Defense Review 3 (2018): 38. Search in Google Scholar

eISSN:
2029-0454
Lingua:
Inglese
Frequenza di pubblicazione:
2 volte all'anno
Argomenti della rivista:
Law, other, Social Sciences, Political Science