Font Size: a A A

Cyber-warfare and the laws of armed conflict: implications of considering a cyber-attack an act of war

Posted on:2017-12-19Degree:M.SType:Thesis
University:Utica CollegeCandidate:Wendt, Donnie WFull Text:PDF
GTID:2446390005474028Subject:Computer Science
Abstract/Summary:
Media, security researchers, and government officials warn of cyber-war. Among the warnings are predictions of a cyber-doomsday that destroys America's critical infrastructure and economic systems. The purpose of this study was to distinguish amongst cyber-attacks, such as cyber-terrorism, cyber-crime, cyber-espionage, and cyber acts of war. This study also investigated the consequences of declaring cyber-attacks as acts of war.;This research reviewed international humanitarian law (IHL) and supporting literature to assist in deciphering the criteria by which a cyber-attack might be construed as an act of war. This research found that a cyber-attack can constitute an armed attack under IHL. However, no clear examples exist of an armed cyber-attack, with the possible exception of an attack on an Iranian nuclear facility. The IHL focus on effects instead of methods allows IHL to adapt to new weapons and methods of war. The limited direct impact and uncontrollability of cyber-weapons act as restraining forces on the use of cyber-warfare. In addition, the fear of retaliation, including with conventional military strikes may also restrain nation-states from engaging in cyber-warfare.;This research recommended the use of cyber-warfare to reduce violence by using cyber-warfare to accomplish military objectives that would otherwise require conventional military attacks. Military leaders should use cyber-attacks alongside conventional attacks to increase the possibility of success and decrease risk to the military forces. However, nations should use caution in launching cyber-attacks that may constitute armed attacks except in self-defense. Armed cyber-attacks constitute a use of force which, except in self-defense, violates IHL.;Keywords: Cybersecurity, Professor Michael Sanchez, just war theory, laws of armed conflict, Tallinn Manual, Stuxnet, proportionality.
Keywords/Search Tags:War, Armed, IHL, Cyber-attack
Related items