Cyberthreats and international law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
The Hague
Eleven Internat. Publ.
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIX, 365 S. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040422009 | ||
003 | DE-604 | ||
005 | 20121030 | ||
007 | t | ||
008 | 120918s2012 |||| 00||| eng d | ||
020 | |z 9789490947644 |9 978-94-90947-64-4 | ||
020 | |z 9490947644 |9 94-90947-64-4 | ||
035 | |a (OCoLC)810262874 | ||
035 | |a (DE-599)BVBBV040422009 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-12 | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Kerschischnig, Georg |e Verfasser |0 (DE-588)1027334695 |4 aut | |
245 | 1 | 0 | |a Cyberthreats and international law |c Georg Kerschischnig |
264 | 1 | |a The Hague |b Eleven Internat. Publ. |c 2012 | |
300 | |a XIX, 365 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Internationales Strafrecht |0 (DE-588)4162101-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internationales Strafrecht |0 (DE-588)4162101-3 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025274694&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025274694 |
Datensatz im Suchindex
_version_ | 1804149481145368576 |
---|---|
adam_text | Table of Contents
Abbreviations
xvii
Methodology
1
Part I Conceptualization of Cyberthreats
1
Introduction
5
1.1
The Evolution of Cyberthreats
5
1.1.1
Dependency, Interconnectivity, and New Vulnerabilities
7
1.1.2
Boundlessness, Anonymity, and Technological Progress
9
1.1.3
The Vagueness of Cyberintrusions and Unclear Responsibilities
10
1.1.4
The Problem of Attribution and Sovereignty in Cyberspace
12
1.2
Definition of the Scope of this Book
13
2
Understanding Cyberthreats
17
2.1
Technical Background
17
2.1.1
Computerization and Interconnectivity
17
2.1.2
The Role of Hard- and Software
18
2.1.2.1
Oligarchy
18
2.1.2.2
Flaws
18
2.2
Institutional Background
20
2.2.1
The Evolution of the Internet
20
2.2.2
A Short History of Governance in Cyberspace
21
2.2.3
Actors and Terms
23
2.2.3.1
Hackers
23
2.2.3.2
Script Kiddies and Cybervigilantes
24
2.2.3.3
Non-State Actors with a Political Agenda
25
2.2.3.4
System Administrators and Cybersecurity Companies
27
2.2.3.5
Cybercriminals
27
2.2.3.6
ICT Companies
29
2.2.3.7
State Actors and CERTs
29
2.2.3.8
The Mass Media
30
2.3
Nature of Cyberweapons
31
2.3.1
Tools
31
2.3.1.1
Viruses and Worms
31
2.3.1.2
Backdoors: Trojans and Rootkits
32
2.3.1.3
Botnets
33
2.3.2
Techniques
34
2.3.2.1
DoS Attacks
34
2.3.2.2
Infiltration
35
2.3.2.3
Social Engineering
36
2.3.2.4
Probing, Sniffing, and Mapping
37
2.3.2.5
Anonymization Techniques
37
2.3.3
Ever-Growing Sophistication
38
3
Cyberthreats and Critical Infrastructure
41
3.1
Definition and Risk Assessment of Critical Infrastructure
41
3.2
Critical Information Infrastructure
42
3.3
СИ
as Catalyst for Vulnerabilities
44
3.3.1
Connectivity
44
3.3.2
Ownership
45
3.3.3
Origin
46
3.3.4
Interdependencies
47
3.4
The Internet as
СП
48
3.4.1
Critical Elements of the Internet
48
3.4.2
The Internet s International Character
50
3.5
Case Study: The Susceptibility of Power Grids to Cyberattacks
51
3.6
Cyberattacks Against Critical Infrastructure
-
A Probable Danger?
52
4
The Scope of Cyberthreats for the Purposes of this Book
57
5
Myth or Reality? Case Studies on Reported Cyberincidents
59
5.1
Evolution of Cyberthreats as a Matter of National Security
59
5.2
Estonia
2007 61
5.3
South Ossetia War
2008 63
5.4
Kyrgyzstan
2009 67
5.5
GhostNet
-
Tibetan Authorities
68
5.6
Stuxnet
-
Iranian Nuclear Program
69
5.7
Operation Aurora
-
Google vs. China
71
5.8
Other Occurrences and Trends
72
5.9
Analysis and Lessons Learned
74
6
Strategie
Reflections on Cyberintrusions
77
7
A Challenge for International Law
79
Part II Interstate Cyberthreats
8
Outlining Cyberwar
83
8.1
Definition
83
8.2
The Role of Cyberspace in Warfare
85
8.3
National and Regional Strategies
90
8.3.1
United States of America
90
8.3.2
People s Republic of China
93
8.3.3
Russian Federation
95
8.3.4
European Union
95
8.3.5
North Atlantic Treaty Organization
97
8.3.6
Others
98
8.3.7
A New Cyber Cold War ?
99
8.4
Cyberwar in International Law
101
9
The Contemporary Jus
Ad Bellům
105
9.1
The Prohibition of the Use of Force
105
9.2
Self-Defense
110
9.2.1
Armed Attack 111
9.2.1.1
Aggression
112
9.2.1.2
Indirect Force
114
9.2.1.3
State Responsibility for the Conduct of
Non-
State Actors
115
9.2.2
Immediacy
117
9.2.3
Necessity and Proportionality
119
9.2.4
Collective Self-Defense and Regional Collective Security
120
9.2.5
The Role of the Security Council with Regard to Self-Defense
120
9.3
Action Taken by the Security Council under Chapter
VII
of the UN
Charter
121
9.3.1
Measures under Article
41
UN Charter
122
9.3.2
Force Authorized by the Security Council
123
9.4
Retorsions and Reprisals
123
9.5
The Principle of Non-intervention
124
10
Cyberwar and the Jus
Ad Bellům
127
10.1
The Use of Force in Cyberspace
128
10.1.1
The Obscurity
Dilemma
128
10.1.2
The Consequential Dilemma
130
10.1.3
CyberattacksasUseofForce
131
10.1.3.1
Schmitt s Scheme
133
10.1.3.2
Measurability
134
10.1.3.3
Presumptive Legitimacy
134
10.1.3.4
Severity
135
10.1.3.5
Immediacy and Directness
137
10.1.4
The Threat of the Use of Force in Cyberspace
139
10.2
Self-Defense
140
10.2.1
Cyberattacks as Armed Attack
141
10.2.1.1
Invasion, Occupation, and Attacks Against the Territory of a State
142
10.2.1.2
Naval Blockade vs.
Infoblockade 143
10.2.1.3
Attack Against the Armed Forces of a State
145
10.2.1.4
Third State Involvement
146
10.2.1.5
Indirect Force
147
10.2.1.6
State Responsibility for Cyberwar Activities by Non-State Actors
149
10.2.2
Immediacy
152
10.2.3
Necessity and Proportionality
154
10.2.3.1
Adequate Form for Self-Defense Against Cyberattacks
155
10.2.4
Collective Cyber Self-Defense and Collective Cybersecurity
157
10.2.5
The Role of the Security Council with Regard to Self-Defense Against
Cyberattacks
158
10.3
Security Council Actions under Chapter
VII
159
10.3.1
Cybermeasures Under Article
41
UN Charter
160
10.3.2
Cyberforce Authorized by the Security Council
161
10.3.3
Cyberspace and the Maintenance of International Peace and Secu¬
rity
162
10.4
Retorsions and Reprisals in Response to Cyberattacks
162
10.5
Cyberattack as Intervention or Other Unlawful Act Under International
Law
163
10.6
Neutrality and Cyberwar
164
10.6.1
Inviolability of Neutral Territory
164
10.6.2
Telecommunication-Specific Provisions
166
10.6.3
Neutral Popular Participation
167
11
Cyberespionage in the Jus
Ad Bellům
171
12 Cyberwar
and the Jus in
Bello
175
12.1
Introduction
175
12.2
Applicability of IHL on Cyberwar
176
12.2.1
International Armed Conflict
177
12.2.2
Violence
178
12.2.3
Non-International Armed Conflict
181
12.3
IHL Aspects Relevant to Cyberwar
182
12.3.1
Distinction
182
12.3.1.1
Military Objectives
183
12.3.1.2
Dual-Use and Human Shields
184
12.3.2
Discrimination
187
12.3.3
Precautions and Proportionality
189
12.3.3.1
Feasibility
190
12.3.3.2
Differentiated Responsibility Due to Technical Proficiency
192
12.3.4
Specifically Protected Objects
193
12.3.4.1
Cultural Property
193
12.3.4.2
Works and Installations Containing Dangerous Forces
194
12.3.4.3
Natural Environment
195
12.3.4.4
Indispensible Objects
195
12.3.5
Ruses of War and Perfidy
196
12.3.6
Weapon Restrictions
197
12.3.7
The Legal Status of Involved Actors
199
12.3.7.1
Combatant Status
199
12.3.7.2
Cyberwarriors: Combatants or Civilians?
200
12.3.7.3
The Problem of Visual Distinction
202
12.3.7.4
Cybermercenaries and Private Contractors
204
12.3.8
Direct Participation in Hostilities
206
12.3.8.1
The ICRC Interpretive Guide
207
12.3.8.2
The
2005
Expert Meeting Report
208
12.3.8.3
Undue Preference for Cyberattacks Among Civilians?
209
12.3.8.4
Critical Examination of the Examples in the ICRC Guide
209
12.3.8.5
Belligerent Nexus
210
12.3.8.6
The Temporal Element of Loss of Immunity
210
12.3.8.7
Unintentional Participation in Hostilities
211
12.3.8.8
Involuntary Participation in Hostilities
211
12.3.8.9
Wanton Participation
213
12.3.9
Uncertainty Prevails
-
A Call for Generalization?
213
13
Cyberespionage in the Jus in
Bello
217
Part HI Non-State Actor Cyberthreats
14
Cyberterrorism
221
14.1
The Changing Face of Terrorism
221
14.2
The Challenge of Cyberspace
224
14.3
Why Cyberterrorism?
225
14.4
A Real Threat or Just Exaggerated Cyberangst?
226
14.4.1
The Use of Cyberspace for Terrorist Purposes
226
14.4.2
The Elements of Cyberterrorism
227
14.4.3
The Likeliness of Cyberterrorism
228
14.4.4
Probable Manifestation of Cyberterrorism
229
14.5
Definition of Cyberterrorism
231
14.5.1
Shifting from a Terrorist Intents-Based to an Effects-Based
Approach
231
14.5.2
Delimitation by the Scale of Attacks
232
14.6
The Convention on Cybercrime
234
14.6.1
Scope of the Convention and its Application on Cyberterrorism
234
14.6.2
Prevention of State-Sponsored Cyberattacks?
235
15
Hacktivism and Webtivism
237
15.1
The Use of Cyberspace for Political Purposes
237
15.2
A Case Study of Hacktivism: Anonymous
239
15.3
Patriotic Hacking
242
16
Human Rights Aspects
245
16.1
Censorship in Cyberspace
246
16.2
Surveillance in Cyberspace
250
16.3
Balancing Human Rights
251
17
New Instruments to Tackle Cyberterrorism?
255
Part IV Jurisdiction and Cyberspace
18
Possible Bases of Jurisdiction
261
18.1
Principles of Jurisdiction
261
18.2
The Jurisdictional Regime of the Convention on Cybercrime
262
18.3
Universal Jurisdiction
262
18.4
Possible ICC Jurisdiction?
264
19
Applying Traditional Principles to Cyberspace
265
20
Enforcement
269
21
Cyberspace as International Space
271
21.1
Analogies to the High Seas
272
21.1.1
Hot Pursuit
272
21.1.2
Piracy
273
22
Jurisdictional Responses to Cyberintrusions
277
Part V A New Approach Toward Cyberthreats
23
Summary of Research Results
281
23.1
Concept of Cyberthreats
281
23.2
Interstate Cyberthreats
282
23.2.1
The Jus
Ad Bellům
282
23.2.2
The Jus in
Bello
285
23.3
Non-State Actor Cyberthreats
287
23.4
Jurisdiction and Cyberspace
288
24
Recommendations to the International Community
291
24.1
Separate Consideration of State and Non-State Actor Threats
291
24.2
Harmonization of State Practice
292
24.3
Shaping of a Global Opinion
293
24.4
Adaptation of the Law of Armed Conflict
294
24.4.1
The Current Situation
294
24.4.2
Reasons for Action
294
24.4.3
Elaboration of a Compendium of State Positions
294
24.4.4
Exclusion of Cyberespionage
295
24.4.5
Obstacles
295
24.4.5.1
The Use of Force Quandary
295
24.4.5.2
The Obscurity Dilemma
296
24.4.5.3
International Humanitarian Law not (yet) in the Spotlight
296
24.5
New Instruments
297
24.5.1
Arms Control Regimes
297
24.5.1.1
Arms Control Based on Monitoring and Verification
297
24.5.1.2
Arms Control Based on a Declaration of Principles
298
24.5.2
Non-State Actors
299
24.5.2.1
Harmonization to Address Serious
Cyberattacks
299
24.5.2.2
Establishment of Cooperative Procedures
300
24.5.2.3
Address Massive Compromisation
301
24.5.2.4
Leave Out Content Issues
301
24.5.3
Potential Controversy
302
24.5.3.1
State-Borne Threats
302
24.5.3.2
Non-State Actor Threats
303
24.6
Overarching Obstacles
304
24.6.1
Obstacles to Investigation
304
24.6.1.1
Anonymity
304
24.6.1.2
Absence of Evidence Standards
305
24.6.2
Obstacles to Cooperation: Differing Agendas and Capabilities
305
24.6.3
Remedy by Other Types of Cooperation
306
24.6.4
Solutions
307
24.7
Establishment of a New Organization?
307
25
Outlook
309
Bibliography
313
Index
359
|
any_adam_object | 1 |
author | Kerschischnig, Georg |
author_GND | (DE-588)1027334695 |
author_facet | Kerschischnig, Georg |
author_role | aut |
author_sort | Kerschischnig, Georg |
author_variant | g k gk |
building | Verbundindex |
bvnumber | BV040422009 |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)810262874 (DE-599)BVBBV040422009 |
discipline | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01502nam a2200373 c 4500</leader><controlfield tag="001">BV040422009</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121030 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120918s2012 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789490947644</subfield><subfield code="9">978-94-90947-64-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9490947644</subfield><subfield code="9">94-90947-64-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)810262874</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040422009</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kerschischnig, Georg</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1027334695</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberthreats and international law</subfield><subfield code="c">Georg Kerschischnig</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">The Hague</subfield><subfield code="b">Eleven Internat. Publ.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 365 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationales Strafrecht</subfield><subfield code="0">(DE-588)4162101-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internationales Strafrecht</subfield><subfield code="0">(DE-588)4162101-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025274694&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025274694</subfield></datafield></record></collection> |
id | DE-604.BV040422009 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:23:43Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025274694 |
oclc_num | 810262874 |
open_access_boolean | |
owner | DE-739 DE-12 |
owner_facet | DE-739 DE-12 |
physical | XIX, 365 S. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Eleven Internat. Publ. |
record_format | marc |
spelling | Kerschischnig, Georg Verfasser (DE-588)1027334695 aut Cyberthreats and international law Georg Kerschischnig The Hague Eleven Internat. Publ. 2012 XIX, 365 S. txt rdacontent n rdamedia nc rdacarrier Internationales Strafrecht (DE-588)4162101-3 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Internationales Strafrecht (DE-588)4162101-3 s Internetkriminalität (DE-588)7864395-8 s Information warfare (DE-588)4461975-3 s DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025274694&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kerschischnig, Georg Cyberthreats and international law Internationales Strafrecht (DE-588)4162101-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4162101-3 (DE-588)7864395-8 (DE-588)4461975-3 |
title | Cyberthreats and international law |
title_auth | Cyberthreats and international law |
title_exact_search | Cyberthreats and international law |
title_full | Cyberthreats and international law Georg Kerschischnig |
title_fullStr | Cyberthreats and international law Georg Kerschischnig |
title_full_unstemmed | Cyberthreats and international law Georg Kerschischnig |
title_short | Cyberthreats and international law |
title_sort | cyberthreats and international law |
topic | Internationales Strafrecht (DE-588)4162101-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Internationales Strafrecht Internetkriminalität Information warfare |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025274694&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kerschischniggeorg cyberthreatsandinternationallaw |