Email: info@ijps.in | Mob: +91-9555269393

Submit Manuscript

Abstract

EMPLOYABILITY OF CYBER OPERATIONS IN THE FRAMEWORK OF INTERNATIONAL LAW AND INTEGRATION OF THE LAWS OF COLLECTIVE SECURITY, USE OF FORCE, SELF DEFENCE AND ARMED CONFLICT

Yashika Nagpal

Amity Law School, Delhi (Affiliated to Guru Gobind Singh Indraprastha University), New Delhi, India

41 - 50
Vol. 8, Jul-Dec, 2019
Receiving Date: 2019-06-19
Acceptance Date: 2019-08-03
Publication Date: 2019-08-16
Download PDF
Abstract

As a result of recent cyber-attacks, this article analyses how current laws of armed conflict might be used or changed to meet the new threats. An explanation of cyber assaults is followed by a look at cyber exploitation and cyber espionage as well as how they vary. According to the article, the current corpus of law regulates cyber-attacks such as the UN Charter, IHL, international treaties, and state laws. Existing law only tackles a tiny percentage of possible cyber-attacks, according to the study's findings. There are just a few cases in which a cyber attack may be equated to an armed conflict, and IHL provides a helpful foundation for them. A new international legal framework is needed to address the difficulties posed by cyber-attacks, according to the article's conclusion, because they are global in character.


Keywords: Cyber; Operations; International Law; Force; Collective Security; Self-Defense; Armed Conflict


References
  1. Brownlie, I. (2012). International Law and the Use of Force by States (p. 362). Oxford: Oxford University Press.
  2. Dinstein, Y. (2002). Computer Network Attacks and Self Defense. In M. N. Schmitt, & B. T. O’Donnell (Eds.), Computer Network Attack and International Law (p. 99). International Law Series, Vol. 76, Newport, RI: Naval War College
  3. Gervais, M. (2012). Cyber-Attacks and the Laws of War. Berkeley Journal of International Law, 30, 525-531.
  4. Graham, D. E. (2010). Cyber Threats and the Law of War. Journal of National Security Law and Policy, 4, 89.
  5. Green, L. C. (2000). The Contemporary Law of Armed Conflict (2nd ed.). Manchester: Manchester University Press.
  6. Hathaway, O. A., & Croot of, R. (2012). The Law of Cyber Attack (p. 850). Faculty Scholarship Series, Paper 3852
  7. Jensen, E. (2002). Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense. Stanford Journal of International Law, 38, 207.
  8. Lin, H. (2010). Offensive Cyber Operations and the Use of Force. Journal of National Security Law & Policy, 4, 63.
  9. Madubuike-Ekwe, N. J. (2017). The Applicability of the Law of Armed Conflict to Cyber warfare: An Overview of Issues. I BUA L. J., 149.
  10. Moore, J. N. (2005). Development of International Law of Conflict Management. In J. N. Moore, & R. F. Turner (Eds.), National Security Law (2nd ed.). Durham, NC: Carolina Academic Press.
  11. National Research Council (NRC) (2009). Technology, Policy, Law and Ethics regarding U.S. Acquisition and Use of Cyber attack Capabilities
  12. Schmitt, M. N. (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 37, 885-937
  13. Sklerov, M. J. (2009). Solving the Dilemma of State Responses to Cyber-Attacks: A Justification for the Use of Active Defenses against States Which Neglect Their Duty to Prevent. Military Law Review, 201, 1-85.
  14. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press (2017).
  15. Wedgewood, R. (2002). Proportionality, Cyberwar and the Law of War. In M. N. Schmitt, & B. T. O’Donnell (Eds.), Computer Network Attack and International Law (pp. 219, 227-230).
  16. Wingfield, T. (2000). The Law of Information Conflict: National Security Law in Cyberspace. Falls Church, VA: Aegis Research Corp
Back

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

daftar togel slot online

slot online gacor

trik slot bonus

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau