Lawful State Responses to Low-Level Cyber-Attacks

in Nordic Journal of International Law
Restricted Access
Get Access to Full Text
Rent on DeepDyve

Have an Access Token?



Enter your access token to activate and access content online.

Please login and go to your personal user account to enter your access token.



Help

Have Institutional Access?



Access content through your institution. Any other coaching guidance?



Connect

The article discusses the sources of international law that may justify a state to respond to harmful interferences in cyberspace that occur outside times of armed conflict and that are not sufficiently serious to merit a rersort to self-defence under the un Charter. The focus is primarily aimed at the more immediate measures a targeted state may adopt in order to bring on-going harmful cyber-activities to a halt. The article opens with a discussion of the application of the traditional principles of sovereignty to activities in cyberspace and subsequently analyses how the principles of countermeasures may be applied to various forms of harmful cyber-incidents that fall below the threshold for triggering a right to self-defence. The article also examines the extent to which a plea of necessity may be invoked in order to justify the use of immediate defensive measures against cyber-attacks that may have an effect on other states.

Lawful State Responses to Low-Level Cyber-Attacks

in Nordic Journal of International Law

Sections

References

  • 15

    Reuters Business‘Obama does not consider Sony hack and act of war’The New York Times21 December 2014 <www.nytimes.com/video/multimedia/100000003383614/obama-does-not-consider-sony-hack-an-act-of-war-cnn-interview.html> visited on 5 January 2015.

    • Search Google Scholar
    • Export Citation
  • 20

    Schreiersupra note 19 p. 10.

  • 22

    Kellosupra note 21 p. 20: “Essentially an intelligence-gathering activity cyberexploitation relies on stealth and undetectability; thus disruption of the host system which can lead to discovery and closure of access defeats the purpose of exploitation.”

  • 23

    M. Mazzetti and D.E. Sanger‘Tap on Merkel Provides Peek at Vast Spy Net’The New York Times30 October 2013 <www.nytimes.com/2013/10/31/world/europe/tap-on-merkel-provides-peek-at-vast-spy-net.html> visited on 29 March 2014.

    • Search Google Scholar
    • Export Citation
  • 24

    J. Reed‘Did Chinese Espionage Lead to F-35 Delays?’Defense Tech8 February 2012 <defensetech.org/2012/02/06/did-chinese-espionage-lead-to-f-35-delays> visited on 29 March 2014. On alleged Chinese cyber-espionage aimed at the United States see also D. E. Sanger et al. ‘Chinese Army Unit Is Seen as Tied to Hacking Against u.s.The New York Times 18 February 2013 <www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html> visited on 29 March 2014.

    • Search Google Scholar
    • Export Citation
  • 33

    Schmittsupra note 6 rules 2 and 3.

  • 34

    Heineggsupra note 16 p. 126. See also Schmitt supra note 6 rule 2(3).

  • 37

    Schmittsupra note 6 rule 5(5).

  • 39

    Schmittsupra note 6 rule 5(5).

  • 45

    Schmittsupra note 6 rule 5(9).

  • 49

    Heineggsupra note 16 p. 137.

  • 50

    Schmittsupra note 6 rule 5(12).

  • 51

    Heineggsupra note 16 p. 138.

  • 56

    Schmittsupra note 6 rule 9.

  • 64

    Schmittsupra note 6 rule 1(6).

  • 67

    Ziolkowskisupra note 63 425–464. See also W.H. Parks ‘The International Law of Intelligence Collection’ in J.N. Moore and R.F. Turner (eds.) National Security Law (Carolina Academic Press Durham 1990) pp. 433–434; D.B. Silver ‘Intelligence and Counterintelligence’ in J.N. Moore and R.F. Turner (eds.) National Security Law (Carolina Academic Press Durham 2005) p. 935. A specific prohibition against espionage is found in the Vienna Convention on Diplomatic Relations supra note 32 Art. 27.

  • 68

    Ziolkowskisupra note 63 pp. 457–459.

  • 80

    Joyner and Lotriontesupra note 7 p. 849; Roscini supra note 7 pp. 102–103.

  • 90

    Geiss and Lahmannibid. pp. 636–637. See also M.E. O’Connell ‘Evidence of Terror’ 7:1 Journal of Conflict and Security Law (2002) and J. Lobel ‘The Use of Force to Respond to Terrorist Attacks: The Bombing of Sudan and Afghanistan’ 24 The Yale Journal of International Law (1999) p. 547.

    • Search Google Scholar
    • Export Citation
  • 91

    Schmittsupra note 6 rule 9(7).

  • 94

    Schmittsupra note 6 rule 9(7).

  • 96

    White and Abasssupra note 54 pp. 539–540.

  • 107

    Roscinisupra note 7 p. 106.

  • 112

    Schmittsupra note 7 p. 915.

  • 113

    Schmittsupra note 6 rule 11(9 a-h).

  • 134

    Schmittsupra note 6 rule 9 (12).

Index Card

Content Metrics

Content Metrics

All Time Past Year Past 30 Days
Abstract Views 128 123 14
Full Text Views 202 202 1
PDF Downloads 26 26 2
EPUB Downloads 1 1 0