Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict
"20 Soon thereafter, the State Department acknowledged Administration initiatives to create "shadow" Internet and mobile-phone systems that could be used to support dissidents in countries facing communications crackdowns from oppressive regimes.21 By June 22- just three weeks after G...
Gespeichert in:
Veröffentlicht in: | Texas international law journal 2012-07, Vol.47 (3), p.617 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 3 |
container_start_page | 617 |
container_title | Texas international law journal |
container_volume | 47 |
creator | Lobel, Hannah |
description | "20 Soon thereafter, the State Department acknowledged Administration initiatives to create "shadow" Internet and mobile-phone systems that could be used to support dissidents in countries facing communications crackdowns from oppressive regimes.21 By June 22- just three weeks after Google reported the latest hack against it- China apparently felt compelled to clarify that the country was not at cyber war with the United States.22 When the Pentagon officially released the unclassified version of its cyber strategy document in mid-July, it was sanitized of the bellicose posturing that accompanied the leak of the full, classified strategy document just six weeks earlier.25 The growing onslaught of cyber operations against U.S. companies and the escalating cyber-war rhetoric between the United States and China point up key complexities in the already fuzzy realm of "cyber war": What role does or should the private sector play in cyber conflict and what are the rules regulating private sector conduct? Because cyber conflict is a new, largely untested, and secretive domain,24 there is great debate about what law of war rules, if any, regulate it. Rather, the United States is viewed as the "number one source of cyber threats" in the world.148 More importantly to developing sound law of war rules, however, is that a relaxed standard of imputation would likely confound the main underlying purpose of attribution, which is to properly identify the perpetrator and make sure that counterstrikes are directed at the right actors. [...]the technical side of attribution develops to a point that instills confidence,149 the best course is to maintain a stricter standard for imputation. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1018566780</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2678580841</sourcerecordid><originalsourceid>FETCH-proquest_journals_10185667803</originalsourceid><addsrcrecordid>eNpjYeA0MDQz1jU3MbfkYOAqLs4yMDA0Mjc042SIcq5MSi1SCE8sUvDMS9azUgjJSFXwSSxXyE-DCOYW5GQmJ5Zk5ucVg8RKgNIBRZlliSWpCsGpySX5RerFCkH5OakKmXkKELOc8_PSgHpKeBhY0xJzilN5oTQ3g7Kba4izh25BUX5haWpxSXxWfmlRHlAq3tDA0MLUzMzcwsCYOFUAYqo_3Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1018566780</pqid></control><display><type>article</type><title>Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>HeinOnline Law Journal Library</source><creator>Lobel, Hannah</creator><creatorcontrib>Lobel, Hannah</creatorcontrib><description>"20 Soon thereafter, the State Department acknowledged Administration initiatives to create "shadow" Internet and mobile-phone systems that could be used to support dissidents in countries facing communications crackdowns from oppressive regimes.21 By June 22- just three weeks after Google reported the latest hack against it- China apparently felt compelled to clarify that the country was not at cyber war with the United States.22 When the Pentagon officially released the unclassified version of its cyber strategy document in mid-July, it was sanitized of the bellicose posturing that accompanied the leak of the full, classified strategy document just six weeks earlier.25 The growing onslaught of cyber operations against U.S. companies and the escalating cyber-war rhetoric between the United States and China point up key complexities in the already fuzzy realm of "cyber war": What role does or should the private sector play in cyber conflict and what are the rules regulating private sector conduct? Because cyber conflict is a new, largely untested, and secretive domain,24 there is great debate about what law of war rules, if any, regulate it. Rather, the United States is viewed as the "number one source of cyber threats" in the world.148 More importantly to developing sound law of war rules, however, is that a relaxed standard of imputation would likely confound the main underlying purpose of attribution, which is to properly identify the perpetrator and make sure that counterstrikes are directed at the right actors. [...]the technical side of attribution develops to a point that instills confidence,149 the best course is to maintain a stricter standard for imputation.</description><identifier>ISSN: 0163-7479</identifier><language>eng</language><publisher>Austin: University of Texas, Austin, School of Law Publications, Inc</publisher><subject>Human rights ; International law ; National security ; Web sites</subject><ispartof>Texas international law journal, 2012-07, Vol.47 (3), p.617</ispartof><rights>Copyright University of Texas, Austin, School of Law Publications, Inc. Summer 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Lobel, Hannah</creatorcontrib><title>Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict</title><title>Texas international law journal</title><description>"20 Soon thereafter, the State Department acknowledged Administration initiatives to create "shadow" Internet and mobile-phone systems that could be used to support dissidents in countries facing communications crackdowns from oppressive regimes.21 By June 22- just three weeks after Google reported the latest hack against it- China apparently felt compelled to clarify that the country was not at cyber war with the United States.22 When the Pentagon officially released the unclassified version of its cyber strategy document in mid-July, it was sanitized of the bellicose posturing that accompanied the leak of the full, classified strategy document just six weeks earlier.25 The growing onslaught of cyber operations against U.S. companies and the escalating cyber-war rhetoric between the United States and China point up key complexities in the already fuzzy realm of "cyber war": What role does or should the private sector play in cyber conflict and what are the rules regulating private sector conduct? Because cyber conflict is a new, largely untested, and secretive domain,24 there is great debate about what law of war rules, if any, regulate it. Rather, the United States is viewed as the "number one source of cyber threats" in the world.148 More importantly to developing sound law of war rules, however, is that a relaxed standard of imputation would likely confound the main underlying purpose of attribution, which is to properly identify the perpetrator and make sure that counterstrikes are directed at the right actors. [...]the technical side of attribution develops to a point that instills confidence,149 the best course is to maintain a stricter standard for imputation.</description><subject>Human rights</subject><subject>International law</subject><subject>National security</subject><subject>Web sites</subject><issn>0163-7479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNpjYeA0MDQz1jU3MbfkYOAqLs4yMDA0Mjc042SIcq5MSi1SCE8sUvDMS9azUgjJSFXwSSxXyE-DCOYW5GQmJ5Zk5ucVg8RKgNIBRZlliSWpCsGpySX5RerFCkH5OakKmXkKELOc8_PSgHpKeBhY0xJzilN5oTQ3g7Kba4izh25BUX5haWpxSXxWfmlRHlAq3tDA0MLUzMzcwsCYOFUAYqo_3Q</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Lobel, Hannah</creator><general>University of Texas, Austin, School of Law Publications, Inc</general><scope>0-V</scope><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7XB</scope><scope>8AM</scope><scope>8AO</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>K7.</scope><scope>M0O</scope><scope>M2O</scope><scope>MBDVC</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20120701</creationdate><title>Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict</title><author>Lobel, Hannah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_10185667803</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Human rights</topic><topic>International law</topic><topic>National security</topic><topic>Web sites</topic><toplevel>online_resources</toplevel><creatorcontrib>Lobel, Hannah</creatorcontrib><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Criminal Justice Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>ProQuest Criminal Justice</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Texas international law journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lobel, Hannah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict</atitle><jtitle>Texas international law journal</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>47</volume><issue>3</issue><spage>617</spage><pages>617-</pages><issn>0163-7479</issn><abstract>"20 Soon thereafter, the State Department acknowledged Administration initiatives to create "shadow" Internet and mobile-phone systems that could be used to support dissidents in countries facing communications crackdowns from oppressive regimes.21 By June 22- just three weeks after Google reported the latest hack against it- China apparently felt compelled to clarify that the country was not at cyber war with the United States.22 When the Pentagon officially released the unclassified version of its cyber strategy document in mid-July, it was sanitized of the bellicose posturing that accompanied the leak of the full, classified strategy document just six weeks earlier.25 The growing onslaught of cyber operations against U.S. companies and the escalating cyber-war rhetoric between the United States and China point up key complexities in the already fuzzy realm of "cyber war": What role does or should the private sector play in cyber conflict and what are the rules regulating private sector conduct? Because cyber conflict is a new, largely untested, and secretive domain,24 there is great debate about what law of war rules, if any, regulate it. Rather, the United States is viewed as the "number one source of cyber threats" in the world.148 More importantly to developing sound law of war rules, however, is that a relaxed standard of imputation would likely confound the main underlying purpose of attribution, which is to properly identify the perpetrator and make sure that counterstrikes are directed at the right actors. [...]the technical side of attribution develops to a point that instills confidence,149 the best course is to maintain a stricter standard for imputation.</abstract><cop>Austin</cop><pub>University of Texas, Austin, School of Law Publications, Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0163-7479 |
ispartof | Texas international law journal, 2012-07, Vol.47 (3), p.617 |
issn | 0163-7479 |
language | eng |
recordid | cdi_proquest_journals_1018566780 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; HeinOnline Law Journal Library |
subjects | Human rights International law National security Web sites |
title | Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T04%3A28%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cyber%20War%20Inc.:%20The%20Law%20of%20War%20Implications%20of%20the%20Private%20Sector's%20Role%20in%20Cyber%20Conflict&rft.jtitle=Texas%20international%20law%20journal&rft.au=Lobel,%20Hannah&rft.date=2012-07-01&rft.volume=47&rft.issue=3&rft.spage=617&rft.pages=617-&rft.issn=0163-7479&rft_id=info:doi/&rft_dat=%3Cproquest%3E2678580841%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1018566780&rft_id=info:pmid/&rfr_iscdi=true |