Cyber : The New Frontier Of International Law

4051 WordsDec 9, 201517 Pages
Cranmer 13 Cyber Space- The new frontier of International Law The rise and global expansion of the Internet has become a powerful technological advancement. The number of individuals around the world using the Internet has skyrocketed since its inception. The world has become more interconnected and mutually dependent than ever. This new interconnected cyber world has also created a new frontier for States to blaze and occupy. Specifically, State militaries have come to rely on new technologies, computer systems and networks that occupy cyberspace, thus opening a new battlefield to wage war and conduct military operations. However, this new frontier raises questions as to what extent do existing international laws can be applied to the…show more content…
If there is no definition of cyberspace, then there can be no such thing as cybercrimes or cyber warfare.[endnoteRef:1] [1: Todd, Graham H. "Cyber-law Edition: Armed Attack in Cyberspace: Deterring Asymmetric Warfare with an Asymmetric Definition." Air Force Law Review 64 (2009): 67. ] What is Cyberspace? Both the U.S. military and scientists played a significant role in the early development of cyberspace. Both groups brought their own ideas on it how it should be developed. The U.S. military wanted the domain to be survivable, flexible, with high performance and importance over commercial and consumer appeal. Conversely, U.S. scientists wanted to simply create an open exchange of information with consumer and commercial appeal. The U.S. defined their newly created cyberspace as ?a global domain within the information environment consisting of interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.?[endnoteRef:2] [2: Preston, 995. ] Computers today control much of the military and the civilian cyber infrastructure. The U.S. alone uses over two million computers and has over ten thousand cyber networks. According to some reports, over 95% of all the Military?s telecommunications travel through public networks and a significant amount
Open Document