Have a personal or library account? Click to login
Cyber Attacks, Information Attacks, and Postmodern Warfare Cover

Cyber Attacks, Information Attacks, and Postmodern Warfare

Open Access
|Oct 2017

References

  1. 1. Beard, Jack M. “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target under International Humanitarian Law.” Vanderbilt Journal of Transnational Law 47 (2014): 67–143.
  2. 2. Bishop, Jonathan. “The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater.” International Journal of Cyber Criminology (IJCC) 7 (2013): 28–48.
  3. 3. Brenner, Susan W., and Leo L. Clarke. “Civilians in Cyberwarfare: Conscriptions.” Vanderbilt Journal of Transnational Law 43 (2010): 1011–1076.
  4. 4. Brunner, Elgin, Anna Michalkova, Manuel Suter, and Myrian Dunn Cavelty. Focal Report 3: Critical Infrastructure Protection – Cybersecurity – Recent Strategies and Policies: An Analysis, CRN Reports. Zurich: Center for Security Studies, 2009.
  5. 5. Clapper, James R. “Worldwide Cyber Threats” (September 10, 2015) https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/clapperopening09102015.pdf.
  6. 6. Firnhaber-Baker, Justine. “From God's Peace to the King's Order: Late Medieval Limitations on Non-Royal Warfare.” Essays in Medieval Studies 23 (2006/7): 19–30.10.1353/ems.2007.0002
  7. 7. Firnhaber-Baker, Justine. “Introduction: History, historians, and seigneurial war”: 1–23. In: Violence and the State in Languedoc, 1250–1400 (Cambridge: Cambridge University Press, 2014).
  8. 8. Gaus, Arthur. “Trolling Attacks and the Need for New Approaches to Privacy Torts.” University of San Francisco Law Review 47 (2012-2013): 353–376.
  9. 9. Geers, Kenneth, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015 // https://ccdcoe.org/multimedia/cyber-war-perspective-russian-aggression-against-ukraine.html.
  10. 10. Gosnell Handler, Stephanie. “The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare.” Stanford Journal of International Law 48 (2012): 209–237.
  11. 11. Grant, John P., and Craig J. Barker. Parry & Grant Encyclopaedic Dictionary of International Law. 3rd ed. Oxford: Oxford University Press, 2009.10.1093/acref/9780195389777.001.0001
  12. 12. Greenwald, Glenn. “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations” // https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/.
  13. 13. Hauser, Michael. “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 223–286. In: Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.
  14. 14. Hiller, Janine S. “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets.” Santa Clara High Technology Law Journal 31 (2015): 163–214.
  15. 15. Kanda, Roman, et al. Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.
  16. 16. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz, and Daniel T. Kuehl. Cyberpower and National Security. Washington: Potomac Books Inc., 2009.
  17. 17. Lee, Dave. “Top US military Twitter feed ‘hacked by Islamic State’.” (January 12, 2015) // http://www.bbc.co.uk/newsbeat/article/30781377/top-us-military-twitter-feed-hacked-by-islamic-state.
  18. 18. Lewis, James Andrew. “Compelling Opponents to Our Will: The Role of Cyber Warfare in Ukraine”: 39–47. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.
  19. 19. Macková, Veronika. “Cyber War of the States: Stuxnet and Flame Virus Opens New Era of War” // http://cenaa.org/wp-content/uploads/2014/05/Veronika-Mackova-PP-No.-15-2013-Vol.-2.pdf
  20. 20. Margulies, Peter. “Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility.” Melbourne Journal of International Law 14 (2013): 496–519.
  21. 21. Masariková, Monika. “Potvrdené. Kyberútoky predmetom článku 5 NATO” (Confirmed. Cyberattacks are subject to Art. 5 NATO) (September 5, 2014) // http://www.cybersec.sk/spravy/politika/potvrdene-kyberutoky-predmetom-clanku-5-nato/.
  22. 22. Melková, Michaela, and Tomáš Sokol. “Kybernetický priestor ako nová dimenzia národnej bezpečnosti” (Cyber Space as the New Dimension of the National Security): 54–64. In: Bezpečnostné fórum 2015. Banská Bystrica: Belianum, 2015.
  23. 23. Neff, Stephen C. War and the Law of Nations. A General History. Cambridge: Cambridge University Press, 2005.10.1017/CBO9780511494253
  24. 24. Nicol, Sarah. “Cyber-bullying and trolling.” Youth Studies Australia 31 (2012): 3–4.
  25. 25. O’Connell, Mary Ellen. “Cyber Security without Cyber War.” Journal of Conflict & Security Law 17 (2012): 187–209.10.1093/jcsl/krs017
  26. 26. Reich, Pauline C., Stuart Weinstein, Charles Wild, and Allan S. Cabalong. “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity.” European Journal of Law and Technology, 1 (2010): 1–58.
  27. 27. Remus, Titiriga. “Cyber-attacks and International law of armed conflict; a ‘jus ad bellum’ perspective.” Journal of International Commercial Law and Technology 8 (2013): 179–189.
  28. 28. Rid, Thomas. “Cyber War Will Not Take Place.” The Journal of Strategic Studies 35 (2012): 5–32.10.1080/01402390.2011.608939
  29. 29. Roscini, Marco. Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press, 2014.10.1093/acprof:oso/9780199655014.001.0001
  30. 30. Schmit, Michael. “Classification of Cyber Conflict.” Journal of Conflict & Security Law 17 (2012): 245–260.10.1093/jcsl/krs018
  31. 31. Schmitt, Michael N. “Computer network attack and the use of force in international law: thought on a normative framework.” Columbia Journal of Transnational Law 37 (1999): 885–937.10.21236/ADA471993
  32. 32. Shackelford, Scott J. “Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks” // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1499849.
  33. 33. Shackelford, Scott J. “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law.” Berkeley Journal of International Law 27 (2009): 192–251.
  34. 34. Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, Virginia: Aegis Research Corp., 1999.
  35. 35. Šmigová, Katarína. “Kybernetické útoky a medzinárodné právo” (Cyber Attacks and International Law): 1224–1230. In: Bratislavské právnické fórum 2013 (Bratislava Legal Forum 2013). Bratislava: Univerzita Komenského, Právnická fakulta, 2013.
  36. 36. Smith, David J. “Russian Cyber Strategy and the War Against Georgia” (January 17, 2014) // http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia.
  37. 37. Smoleňová, Ivana. “Campaign in the Czech Republic and Slovakia: Types of Media Spreading Pro-Russian Propaganda, their Characteristics and Frequently Used Narratives” // http://www.pssi.cz/download/docs/253_is-pro-russian-campaign.pdf.
  38. 38. Stinissen, Jan. “A Legal Framework for Cyber Operations in Ukraine”: 123–134. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.
  39. 39. The Economist. “A Cyber-riot” (May 10, 2007) // http://www.economist.com/node/9163598.
  40. 40. Valuch, Jozef, Michaela Rišová, and Radoslav Seman. Právo medzinárodných organizácií (The Law of International Organisations). Praha: C. H. Beck, 2011.
  41. 41. Vršanský, Peter. “The United Nations Charter entered into force 70 years ago (is the twilight of the United Nations near?).” Slovak yearbook of international law 5 (2015): 6–21.
  42. 42. Vršanský, Peter, Jozef Valuch, et al. Medzinárodné právo verejné. Všeobecná časť (Public International Law. The General Part). Bratislava: Eurokódex, 2012.
  43. 43. Weber, Max. “Politics as a Vocation” // http://anthropos-lab.net/wp/wp-content/uploads/2011/12/Weber-Politics-as-a-Vocation.pdf.
  44. 44. Wirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”: 29–37. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.
  45. 45. Žižek, Slavoj. Welcome to the Desert of the Real! Five Essays on September 11 and Related Dates. London: Verso, 2002.10.1215/9780822385059-013
  46. 1. An Outline for European Cyber Diplomacy Engagement. 9967/4/14 REV 4, DG D 1C, Brussels, September 2014.
  47. 2. Australian Government Cyber Security Strategy, 2009 // http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20Strategy%20-%20for%20website.pdf.
  48. 3. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. JOIN(2013) 1 final, Brussels, 2013.
  49. 4. Declaration of Principles of International Law Concerning Friendly Relations and Cooperation among States in Accordance with the Charter of the United Nations. Resolution adopted by the General Assembly on October 24, 1970, Res. 2625 (XXV).
  50. 5. ICJ Opinion on Legality of Threat or Use of Nuclear Weapons. July 8, 1996, alinea 39.
  51. 6. Koncepcia kybernetickej bezpečnosti Slovenskej republiky (Conception of Cyber Security of the Slovak Republic) // https://lt.justice.gov.sk/Attachment/Vlastn%C3%BD%20materi%C3%A1l_docx.pdf?instEID=-1&attEID=75645&docEID=413095&matEID=7996&langEID=1&tStamp=20150218154455240.
  52. 7. Letter dated January 9, 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations, addressed to the Secretary-General. United Nations, General Assembly, A/69/723, 2015.
  53. 8. Nicaragua Case (Military and Paramilitary Activities in and against Nicaragua; Nicaragua v. USA). ICJ Reports, 1986, al. 202.
  54. 9. Nicaragua v. USA. ICJ Judgment of June 27, 1986, al. 195.
  55. 10. Nové hrozby - kybernetické dimenzie (New risks – cyber dimensions). NATO Review // http://www.nato.int/docu/review/2011/11-september/cyber-Threads/SK/index.htm.
  56. 11. Report of Independent International Fact-Finding Mission on the Conflict in Georgia. Vol. I., September 2009 // http://echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf.
  57. 12. Report of the Independent Fact-Finding Mission on the Conflict in Georgia. Vol. II, September 2009 // http://www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf.
  58. 13. Report of the Secretary-General's High-level Panel on Threats, Challenges and Change (2004) // http://www.un.org/en/peacebuilding/pdf/historical/hlp_more_secure_world.pdf.
  59. 14. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts, A/70/174, July 22, 2015 // http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174.
  60. 15. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts (GGE). A/68/98, June 24, 2013.
  61. 16. Tallinn Manual – Research. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence) // https://ccdcoe.org/research.html.
  62. 17. Tallinn Manual on the International Law Applicable to Cyber Warfare, 2012.
Language: English
Page range: 63 - 89
Submitted on: Apr 3, 2017
Accepted on: Jun 15, 2017
Published on: Oct 25, 2017
Published by: Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2017 Jozef Valuch, Tomáš Gábriš, Ondrej Hamuľák, published by Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.