Have a personal or library account? Click to login
Once Upon a Time in Cyberspace: A Grim Reality about the Dangers of Cyberwarfare Cover

Once Upon a Time in Cyberspace: A Grim Reality about the Dangers of Cyberwarfare

By: Gia Fernicola  
Open Access
|Oct 2020

References

  1. ANTONIN-KENKINS, Vida. Defining the Parameters of Cyberwar Operations: Looking for Law in all the Wrong Places?, Naval Law Review, 2005, vol. 51, pp. 132–174.
  2. BENATAR, Marco. The Use of Cyber Force: Need for Legal Justification, Goettingen Journal of International Law, 2009, vol. 1, no. 3, pp. 376–396.
  3. BROWN, Gary. International Law Applies to Cyber Warfare: Now What, Southwestern Law Review, 2017, vol. 46, pp. 355–377.
  4. CATWRIGHT, Gen. James. Memorandum for Chiefs of the Military Services, Commanders of the Combatant Command. Directors of the Joint Staff Directories on Joint Technology for Cyberspace Operations, 2011, pp. 1–16.
  5. CHALLIOT PAPERS, Hacks, Leaks and Disruptions Russian Cyber Strategies, 2018, pp. 5–129.
  6. CHARLET, Kate. How the U.S. Approach to Cyber Conflict Evolved in 2018—and What Could Come Next. [online]. Available at Accessed: 03/19/2020.
  7. Convention on Cybercrime, art.32, Nov. 23, 2001, E.T.S. 185.10.1353/nlh.2001.0003
  8. CREEKMAN, Daniel. A Helpless America? An Examination of the Legal Options Available to the United States in Response to Various Cyber-attacks From China, American University International Law Review, 2002, vol. 17, no. 3, pp. 641–681.
  9. Critical Infrastructure Sectors. [online]. Available at Accessed: 03/24/2020.
  10. Department of Justice. “Cyber Threats to our Nation’s Critical Infrastructure,” 2018, pp. 1–13.
  11. DEVER, John, DEVER, James. Cyberwarfare: Attribution, Preemption, and National Self Defense, Journal of Law & Cyber Warfare, 2013, vol. 1, no. 2, pp. 25–63.
  12. Exec. Order No. 13, 231, Critical Infrastructure Protection in the information Age, 2001, 86 Fed. Reg. 53,063.
  13. Financial Sector Cybersecurity. [online]. Available at Accessed: 03/15/2020.
  14. GOSNELL HANDLER, Stephanie. New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare, Stanford Journal of International Law, 2012, vol. 48, no.1, pp. 209–287.
  15. GRAHAM, David. Cyber Threats and the Law of War, National Journal of Security & Policy, 2010, vol. 4, no. 1, pp. 87–102.
  16. GROSS, Michael, CANETTI, Daphna, VASHDI, Dana. The Psychological Effects of Cyber Terrorism. 72 Bulletin of Atomic Scientists, 2016, vol. 75, no. 5, pp. 284–291.10.1080/00963402.2016.1216502
  17. HATHAWAY, Oona, CROOTOF, Rebecca, LEVITZ, Phillip, NIX, Haley, NOWLAN, Aileen, PERDUE, William, SPIEGEL, Julia. The Law of Cyber-Attack, Yale Law School Legal Scholarship Repository, 2012, vol. 100, no. 817, pp. 817–886.
  18. HERBERT, Lin. Offensive Cyber Operations and the Use of Force, Journal of National Security Law & Policy, 2010, vol. 4, no. 63, pp. 63–86.
  19. HOISINGTON, Matthew. Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense, Boston College International & Comparative Law Review, 2009, vol. 32, p. 439–454.10.2139/ssrn.1542223
  20. HOLLIS, Duncan. Why States Need an International Law for Information Operations, Lewis & Clark Law Review, 2007, vol. 11, no.4, pp. 1023–1061.
  21. Indictment in United States v. Ahmad Fathi, et al., No. 16-CRM-48 (S.D.N.Y. 2016).
  22. KOH, Harold. International Law in Cyberspace, Harvard International Law Journal, 2012, pp. 1–12.
  23. LEWIS, James. Securing Cyberspace for the 44th Presidency, 2018, p. 1. [online]. Available at Accessed: 03/1/2020.
  24. MCGHEE, James. Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy, Journal of Law & Cyber Warfare, 2013, vol. 2, no. 1, pp. 64–103.
  25. Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. U.S.), 1986 I.C.J. 14. National Cyber Strategy of the United States of America. [online]. Available at https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf Accessed: 03/22/2020.
  26. PATTERSON, Ryan. Silencing the Call to Arms: A Shift away from Cyber Attacks as Warfare, Loyola of Los Angeles Law Review, 2015, vol. 48, pp. 969–1016.
  27. PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure from Cyber Warfare, Journal of Law & Cyber Warfare, 2012, vol. 1, no. 1, pp. 99–154.
  28. REDDY, Namratha. Economic Infrastructure—Into, Types, Significance. [online]. Available at Accessed: 03/24/2020.
  29. SANDERS, Christopher. The Battlefield of Tomorrow, Today: Can a Cyberattack Ever Rise to an “Act of War?” Utah Law Review, 2018, vol. 2018, no. 2, pp. 503–522.
  30. SHALINI, S. Budapest Convention on Cybercrime – An Overview. [online]. Available at Accessed: 03/24/2020.
  31. SHARP, Walter. Cyberspace and the Use of Force, 1999, pp. ii–234.
  32. SHMITT, Michael. The Law of Cyberwarfare: Quo Vadis? Stanford Law and Policy Review, 2014, vol. 25, pp. 269–299.
  33. SUKHARENKO, Alexander. Russian ITC Security Policy and Cybercrime. [online]. Available at Accessed: 03/22/2020.
  34. TALLINN MANUAL ON THE INTERNATIONAL LAW APPLICABLE TO CYBER WARFARE, pp. 1–215.
  35. The Comprehensive National Cybersecurity Initiative. [online]. Available at Accessed: 03/20/2020.
  36. The National Strategy for Physical Protection of Critical Infrastructure and Key Assets. [online]. Available at Accessed: 03/24/2020.
  37. TRAUTMAN, Lawrence. Cybersecurity: What About U.S. Policy, University of Illinois Journal of Technology & Policy, 2015, vol. 2015, no. 2, pp. 341–391.
  38. U.N. Charter.
  39. U.S. Department of Homeland Security Cyber Infrastructure Sector Alert TA18-074A “Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure.” [online]. Available at Accessed: 03/12/2020.
  40. VALUCH, Jozef, HAMULAK, Ondrej. Abuse of Cyberspace Within the Crisis in Ukraine, The Lawyer. Quarterly, 2018, vol. 8, no. 2, pp. 94–107.
  41. VALUCH, Jozef, GABRIS, Tomas, HAMULAK, Ondrej. Cyber Attacks, Information Attacks, and Postmodern Warfare, Baltic Journal of Law & Politics, vol. 10, no. 1, pp. 63–89. https://doi.org/10.1515/bjlp-2017-000310.1515/bjlp-2017-0003
  42. VISHWANATH, Arun. The Internet is Already Being Weaponized. The U.S. Cyberattack on Iran Won‘t Help. [online]. Available at Accessed: 03/24/2020.
  43. VISNER, Samuel. Cyber Security’s Next Agenda, Georgetown Journal of International Affairs, 2013, pp. 89–99.
  44. ZHANG, Zhen. Cyberwarfare Implications for Critical Infrastructure Sectors, Homeland Security Review, 2011, vol. 5, no. 3, pp. 281–296.
DOI: https://doi.org/10.2478/iclr-2020-0004 | Journal eISSN: 2464-6601 | Journal ISSN: 12138770
Language: English
Page range: 77 - 96
Published on: Oct 14, 2020
Published by: Palacký University Olomouc
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 Gia Fernicola, published by Palacký University Olomouc
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.