TITLE

Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations

AUTHOR(S)
ROSCINI, MARCO
PUB. DATE
May 2015
SOURCE
Texas International Law Journal;2015, Vol. 50 Issue 2, p233
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article reports some evidentiary issues, such as unlawful conduct, are not peculiar to cyber operations, in inter-state litigation. Topics discussed include the decision of the International Court of Justice (ICJ) in the case 'Nicaragua v. United States;' the Russian Federation's 2007 Distributed Denial of Service (DDoS) attacks against Estonia and 2008 cyber attacks against Georgia; and need of reform in the international information security and evidence laws.
ACCESSION #
108372859

 

Related Articles

  • Cyberwar & International Law Step Zero. EICHENSEHR, KRISTEN E. // Texas International Law Journal;2015, Vol. 50 Issue 2, p355 

    The article reports on the challenges faced by the international law over cyber infrastructure and cyber warfare. Topics discussed include the technological innovation and development of international law; establishment of the "international law step-zero," and efficiency of application of...

  • Not Just Cyberwarfare. Christianson, Bruce // Philosophy & Technology;Sep2015, Vol. 28 Issue 3, p359 

    Bringsjord and Licato provide a general meta-argument that cyberwarfare is so different from traditional kinetic warfare that no argument from analogy can allow the just war theory of Augustine and Aquinas (hereinafter called JWT) to be pulled over from traditional (modern) warfare to...

  • Cyber Sovereignty: The Way Ahead. JENSEN, ERIC TALBOT // Texas International Law Journal;2015, Vol. 50 Issue 2, p273 

    The article discusses the sovereign power of a state over their cyber infrastructure and mentions it's responsibility to control that infrastructure. Topics discussed include the cardinal principles of sovereignty and their application to cyberspace, sovereign duties and obligations, and...

  • "Use of Force" and "Armed Attack" Thresholds in Cyber Conflict: The Looming Definitional Gaps and the Growing Need for Formal U.N. Response. DEV, PRIYANKA R. // Texas International Law Journal;2015, Vol. 50 Issue 2, p379 

    The article reports on the challenges faced by the international law over cyber warfare and discusses the role of technological innovation in increasing the dangers of cyber actions. Topics discussed include efficiency of application of existing laws of war in context to the information...

  • By Disanalogy, Cyberwarfare Is Utterly New. Bringsjord, Selmer; Licato, John // Philosophy & Technology;Sep2015, Vol. 28 Issue 3, p339 

    We provide an underlying theory of argument by disanalogy, in order to employ it to show that cyberwarfare is fundamentally new (relative to traditional kinetic warfare, and espionage). Once this general case is made, the battle is won: we are well on our way to establishing our main thesis:...

  • CYBERARMIES RISING? Sustar, Lee // SC Magazine: For IT Security Professionals (15476693);Sep2015, Vol. 26 Issue 9, p16 

    The article examines the boundaries between espionage and acts of war in the virtual world. Topics discussed include the circumstances when cyberespionage crosses the line into cyberwar, the data breach at the U.S. Office of Personnel Management (OPM), and the need for the U.S. government to...

  • INTERNATIONAL CYBERWAR 2033. Cosby, Lloyd N. "Neale" // Army AL&T Magazine;Jan-Mar2015, p177 

    The article provides a fictional outlook on the virtual training and warfare for 2033. Topics discussed include a wristwatch that can indicate an emergent national security crisis, training, tracking, updating, retraining and rehearsing the enemy cyberthreat and disruption of the Global...

  • Cyber Conflicts: Addressing the Regulatory Gap. Glorioso, Ludovica // Philosophy & Technology;Sep2015, Vol. 28 Issue 3, p333 

    The article reports on cyber conflicts. Topics discussed include use of information and communication technologies (ICTs), cyber warfare and hacktivism, and cyber crime and cyber terrorism. Also being discussed are digitization process by governments and international institutions, and military...

  • Cyber - the 21st Century Threat. Mahon, Tim // Military Technology;2015, Vol. 39 Issue 5, p20 

    The article discusses the issue of cyber threats or cyber-crime faced by governments and military forces. Topics include attack on the Canadian government websites in 2011 which forced Canadian economic agencies to disconnect from the Internet for a period; several cyber defence policies by the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics