Title: The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War
Abstract: Most cyber-intrusions now and in the foreseeable future will take place outside the traditional consensus normative framework for uses of force supplied by international law. For the myriad, multi-layered and multi-faceted cyber-attacks that disrupt but do not destroy, whether state-sponsored or perpetrated by organized private groups or single hacktivists, much work remains to be done to build a normative architecture that will set enforceable limits on cyber intrusions and provide guidelines for responses to disruptive cyber-intrusions. In this paper, my interest is directed at a subset of those cyber-attacks – those where terrorists are responsible or attribution is not known but points in terrorists’ direction, and where the effects are very disruptive but not sufficiently destructive to cross the traditional LOAC and Charter self-defense thresholds.
Publication Year: 2012
Publication Date: 2012-01-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 2
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot