preview

International And Domestic Criminal Law

Satisfactory Essays

Introduction Cybersecurity, cyber conflict, cyberwarfare, cyberattack. In addition to these terms, there are countless others relating to the evolving technological capabilities and the emerging ?battlespace? dimension that is cyberspace. A robust volume of scholarly literature has attempted to address numerous emerging security concerns in the cyber realm making cybersecurity one of the most discussed areas of study. Key leaders in the field of cybersecurity including General (ret.) Keith Alexander has stated that threats from the cyber realm are going to be some of the top security challenges the United States faces in the 21st century.[footnoteRef:1] Comment by Grammarly: Deleted: a Comment by Grammarly: Deleted:ve [1: Shalal-Esa, …show more content…

rights and responsibilities, and how to respond appropriately to cyber incidents of increasing severity up to and including incidents that might call for the application of the Law of Armed Conflict. Comment by Grammarly: Deleted:the [2: Schmitt, Michael N., ed., The Tallinn Manual on the International Law Applicable to Cyber Warfare, (Cambridge: Cambridge University Press, 2013)] As the spectrum of cyber has grown, the ability to exert influence in this emerging dimension provides broadened capabilities due to cyberspace?s low barriers to entry and fluid nature.[footnoteRef:3] Cyber incidents can thus range between a basic denial of service attack (where a network is overloaded with requests and shuts down)[footnoteRef:4] to operations of much greater severity. Increased state capacity to use offensive cyber resources is evidenced by official publications such as the 2015 Department of Defense Cyber Strategy.[footnoteRef:5] This includes measures up to the level of offensive cyberattacks on enemy systems and networks. The increased sophistication of offensive cyber weaponry means that the implications of its usage will have to bear further scrutiny. This challenge is only exacerbated by emerging capabilities available to non-State actors and their ability to exploit cyber resources to their advantage in asymmetric conflict. [3: Singer, P.W., & Allan Friedman,

Get Access