Have a personal or library account? Click to login
Cyber Operations against Critical Financial Infrastructure: a Non-Destructive Armed Attack? Cover

Cyber Operations against Critical Financial Infrastructure: a Non-Destructive Armed Attack?

By: Jakub Spáčil  
Open Access
|Mar 2023

References

  1. Canada. National Strategy for Critical Infrastructure. [online] p. 2. Available at: < https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/srtg-crtcl-nfrstrctr-eng.pdf> Accessed: 22. 10. 2022.10.55535/RMT.2022.3.01
  2. CARTOON NETWORK STUDIOS. Rick and Morty: The Rickshank Rickdemption. Burbank, USA: Cartoon Network Studios, 2017. Also available on Youtube.com at . Accessed: 22. 10. 2022.
  3. Commission of the European Communities. Green Paper on a European Programme for Critical Infrastructure Protection. [online] p. 24. Available at: < https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52005DC0576&from=EN> Accessed: 22. 10. 2022.
  4. Department of Defense of the United States of America. Cyberspace Policy Report. [online] p. 4. Available at: < https://irp.fas.org/eprint/dod-cyber.pdf > Accessed: 22. 10. 2022.
  5. Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace. [online] p. 1–2. Available at: < https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf > Accessed: 22. 10. 2022.
  6. FARER, Tom, J. Political and Economic Coercion in Contemporary International Law. American Journal of International Law, 1985, vol. 79, no. 2, pp. 405–413.10.2307/2201710
  7. Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace. [online] p. 4. Available at: Accessed: 22. 10. 2022.
  8. FERNICOLA, Gia. Once Upon a Time in Cyberspace: A Grim Reality About the Dangers of Cyberwarfare. International Comparative and Law Review, 2020, vol. 20, no. 1, p. 81.10.2478/iclr-2020-0004
  9. Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement. [online] Available at: < https://www.gov.uk/government/publications/application-of-international-lawto-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement> Accessed: 22. 10. 2022.
  10. France. International Law Applied to Operations in Cyberspace. [online] p. 5. Available at: < https://documents.unoda.org/wp-content/uploads/2021/12/French-position-on-international-law-applied-to-cyberspace.pdf> Accessed: 22. 10. 2022.
  11. Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace. [online] pp. 8–9. Available at: Accessed 22. 10. 2022.
  12. GRAHAM, David, E. Cyber Threats and the Law of War. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 91.
  13. HATHAWAY, Oona, CROOTOF, Rebecca, LEVITZ, Philip, NIX, Haley, NOWLAN, Aileen, PERDUE, William, SPIEGEL, Julia. The Law of Cyber-Attack. California Law Review, 2012, vol. 100, no. 4, p. 845.
  14. Charter of the United Nations.
  15. Italy. Italian Position Paper on ‘International Law and Cyberspace‘. [online] p. 9. Available at < https://www.esteri.it/mae/resource/doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdf> Accessed: 22. 10. 2022.
  16. KILOVATY, Ido. Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare Towards a Broader Scope of Article 2(4) of the UN Charter. Journal of Law and Cyber Warfare, 2015, vol. 4, no. 3, p. 215.
  17. LIN, Herbert. Offensive Cyber Operations and the Use of Force. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 74.
  18. LOTRIONTE, Catherine. Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law. The Cyber Defense Review, 2018, vol. 3, no. 2, p. 89.
  19. NGUYEN, Reese. Navigating Jus Ad Bellum in the Age of Cyber Warfare. California Law Review, 2013, vol. 101, no. 4, p. 1117.
  20. PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for Federal Government to Protect Critical Infrastructure from Cyber Warfare. Journal of Law and Cyber Warfare, 2012, vol. 1, no. 1, p. 124.
  21. Protiviti. China’s Cybersecurity Law: Critical Information Infrastructure. [online]. Available at: < https://www.protiviti.com/AU-en/insights/pov-critical-information-infrastructure#:~:text=According%20to%20the%20Cybersecurity%20Law,compromised%20network%2C%20or%20system%20malfunction> Accessed: 22. 10. 2022.
  22. PURSIAINEN, Christer. Russia’s Critical Infrastructure Policy: What dowe Know About it? European Journal for Security Research, 2021, vol. 6, no. 1, p. 29.10.1007/s41125-020-00070-0
  23. ROSCINI, Marco. Cyber Operations and the Use of Force in International Law. 1st ed. New York: Oxford University Press, 2016, p. 74.
  24. SIMMA, Bruno et al. (Eds.) The Charter of the United Nations: A Commentary. 3rd ed. Oxford: Oxford University Press, 2012, p. 208.
  25. SHARP, Walter, Gary. Cyberspace and the Use of Force. Ageis Research Corp, 1999, pp. 129–133.
  26. SCHMITT, Michael, BILLER, Jeffrey. The NotPetya Cyber Operation as a Case Study of International Law. [online] Available at: Accessed: 22. 10. 2022.
  27. SCHMITT, Michael, N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press, 2017.10.1017/9781316822524
  28. SCHMITT, Michael, N. The Law of Cyber Warfare: Quo Vadis? Stanford Law and Policy Review, 2014, vol. 25, no. 1, p. 283.
  29. SCHMITT, N. Michael. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 1999, vol. 37, pp. 914–915.10.21236/ADA471993
  30. The Federal Government of Germany. On the Application of International Law in Cyberspace. [online] p. 14–15. Available at: Accessed 22. 10. 2022.
  31. United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266. 13 July 2021, UN Doc. A/76/136 [online] p. 30. Available at: < https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdf> Accessed: 22. 10. 2022.
  32. VALUCH, Jozef, HAMUĽÁK, Ondrej. Use of Force in Cyberspace. International and Comparative Law Review, 2020, vol. 20, no. 2, p. 182.10.2478/iclr-2020-0023
  33. WAXMAN, Matthew, C. Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4). The Yale Journal of International Law, 2011, vol. 36, no. 1, p. 436.10.2139/ssrn.1674565
  34. White House. Presidential Policy Directive – Critical Infrastructure Security and Resilience. [online] Available at: < https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-andresil> Accessed 22. 10. 2022.
DOI: https://doi.org/10.2478/iclr-2022-0013 | Journal eISSN: 2464-6601 | Journal ISSN: 12138770
Language: English
Page range: 27 - 42
Published on: Mar 1, 2023
Published by: Palacký University Olomouc
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2023 Jakub Spáčil, published by Palacký University Olomouc
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.