Abstract
This paper reviews international technical, legal, strategy, and policy initiatives aimed at providing a legal infrastructure for what transpires over the cyberspace. It provides readers with the understanding required to handle delicate legal and definitional issues, and concludes by examining the role of the international humanitarian law and other UN conventions in further developing international regulatory framework, standards, and norms.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Maitra’s Internet Solutions for Project Managers, Ibid 3 (Maitra 2000) Chapter 6.
Cerf. Vint. Re-evaluating mission, performance and outcomes, interview article published in Glenn (2010), p. 22.
Botnets are collections of computers injected with malicious code that can be controlled remotely through a command and control infrastructure. A bot is an individual computer infected with malicious code that participates in a botnet and carries out the commands of the botnet controller.
Cyber Terrorist Group ‘Anonymous’ Sends Warning to Banks, Corporations, Power Elite and NATO (2011).
Ibid.
Tiku (2010a).
Tiku (2010b).
Ibid 9.
Defending the Nation from Cyber Attack (Business Executives for National Security) (2012).
Cyber Defence Forum (2012).
Advanced persistent threats: how they work. Symantec. http://www.symantec.com/theme.jsp?themeid=apt-infographic-1.
Hathaway (2009).
Nakashima (2014).
Convention on Cybercrime CETS No: 185. Council of Europe. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&CL=ENG.
Emm (2009).
A DoS attack floods a server with huge quantities of emails or server requests and the server ultimately collapses. A more advanced DoS attack is known as Distributed Denial of Service (DDoS). Under DDoS attacks, more than one computer is used to send the data or requests to the server. The same laws are applicable for both DoS and DDoS attacks.
UK and Sweden Enact Laws Against Cyber Crimes—Hackers Given A Message: DoS is a Crime. SECURE64. http://www.secure64.com/news-uk-sweden-laws-cyber-crimes.
Ibid.
Ibid.
Cybercrime, Cybersecurity, and Right to Privacy (2014).
Mele (2012).
Ibid.
Mele et al. (2013).
Sanger (2012).
Ibid.
Ibid, supra note 1, at A1.
Ibid.
Fidler (2011).
Clarke (2010).
Paganini (2012).
Falliere et al. (2011).
As referenced in ibid.
Ibid.
Ibid.
Paganini (2014b).
Cyberattacks Jam Government and Commercial Web Sites in USA and South Korea (2009). As referenced in Malawer, Ibid.
Perlroth and Hardy (2013).
Ibid.
Ibid.
Paganini, ibid. 37.
Ibid.
Ibid.
Ibid.
Ibid.
Ibid.
Kelly (2012).
“Beyond a cyber command, the Pentagon is grappling with a dizzying array of policy and doctrinal questions involving cyber warfare.” “Questions Stall Pentagon Computer Defenses.” Washington Post, 2010. Also, see Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities (National Academy of Sciences and National Research Council, 2009). http://books.nap.edu/openbook.php?record_id=12651&page=R1. Ibid.
Securing cyberspace for the 44th presidency—a report of the center for strategic and international studies commission on cybersecurity for the 44th presidency (Center for Strategic and International Studies, December 2008). http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf. Ibid.
Kelly, Ibid.
Ibid.
Ibid.
Estonia has risen to become a thought leader in cyber-domain after sustaining a serious attack across its government sites in 2007.
Mele, Ibid.
Ibid.
Cyber War: War in the Fifth Domain (2010).
Lynn III (2010).
Military Command is Created for Cyber Security (2009).
Paganini, Ibid.
Palace Calls for End to Cyber-Attacks Over Panatag Shoal Row (2012).
Ibid.
Cyber War: War in the Fifth Domain, Ibid.
Herzon, Ibid.
The Tallinan Manual (forthcoming, © Cambridge University Press 2013), pending formal publication, its citation is The Rule.
White House (2011).
White House (2009).
U.K. Cabinet Office (2009).
National Academy of Sciences and National Research Council (2009).
Center for Strategic and International Studies (2008).
Mele, Ibid.
Cyber War: War in the Fifth Domain, Ibid.
The Rule. Ibid.
Lele and Samuel (2012).
The Tallinn Manual, © Cambridge University Press 2013.
Mele (2012).
Ibid.
Samuel (2012).
Ibid. Lele and Samuel (2012).
Cyber War: War in the Fifth Domain, Ibid.
References
Bradley J, Barbier J, Handler D (2013) Embracing the Internet of everything to capture your share of $14.4 trillion. White Paper. CISCO
Clarke RA (2010) Cyber war: the next threat to national security and what to do about it. Harper–Collins. http://www.asil.org/insights120620.cfm
Crippling Cyber-Attacks Relied on 200,000 Computers (2009) Financial Times
Cybercrime, Cybersecurity, and Right to Privacy (2014) 52nd report of the standing committee on information technology (2013–2014). Ministry of Communications and Information Technology, Department of Electronics and Information Technology
Cyber Defence Forum (2012) How confident are we in today’s cyber defence measures. Survey Report
Cyberattacks Jam Government and Commercial Web Sites in USA and South Korea (2009) New York Times
Cyber Terrorist Group ‘Anonymous’ Sends Warning to Banks, Corporations, Power Elite and NATO (2011) This is no longer your world. Appearing in Ray Alex blog. http://tommytoy.typepad.com/tommy-toy-pbt-consultin/2011/06/these-guys-can-make-a-difference-the-worlds-most-famous-hacker-group-anonymous-known-for-effectively-shutting-dow.html
Cyber War: War in the Fifth Domain (2010) The Economist
Defending the Nation from Cyber Attack (Business Executives for National Security) (2012) As delivered by secretary of defense Leon E. Panetta, New York, New York. http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1728
Emm D (2009) Cybercrime and the law: a review of UK Computer Crime Legislation. SECURELIST. http://securelist.com/analysis/36253/cybercrime-and-the-law-a-review-of-uk-computer-crime-legislation/
Falliere N, Murchu LO, Chien E (2011) Updated W32.Stuxnet Dossier, v1.4. Symantec Security. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
Fidler DP (2011) Was Stuxnet an act of war? Decoding a cyberattack. IEEE Security and Privacy, pp. 56–59, as referenced Ibid, 23
Geers K (2011) Strategic cyber security. NATO Cooperative Cyber Defence Centre of Excellence
Glenn M (2010) Reimagining the 21st century university. Universitat Oberta de Catalunya (UOC), p 37
Hathaway M (2009) Five myths about cybersecurity. http://blog.executivebiz.com/2009/12/five-myths-about-cybersecurity/
Herzog S (2011) Revisiting the Estonian cyber attacks: digital threats and multinational responses. J Strateg Secur 4(2):49–60. http://www.gmanetwork.com/news/story/255816/news/nation/palace-calls-for-end-to-cyber-attacks-over-panatag-shoal-row
Kelly S (2012) Government not keeping pace with cyber threats. Security clearance. http://security.blogs.cnn.com/2012/02/01/government-not-keeping-pace-with-cyber-threats/
Lele A, Samuel C (2012) Panetta’s prescription for new directions in Us–India defence relations: cyber and space security. IDSA Comment
Lynn WJ III (2010) Defending a new domain: the Pentagon’s cyberstrategy. Foreign Affairs
Maitra AK (1996) Building a corporate internet strategy: the IT manager’s guide. Von Nostrand Reinhold; Chinese Translation by International Thomson Publishing (1998)
Maitra AK (1997) Executive management report on eMarket for Koch-Glitch International
Maitra AK (2000) Internet solutions for project managers, Chapters 4 and 5. Wiley, New York
Maitra AK (2009) The 21st century university. Coming full-circle to the past. In: Proceedings of the Open EdTech Summit, Barcelona, Spain
Malawer SS (2010) Cyber warfare: law and policy proposals for U.S. and global governance. Virginia Lawyer, International Practice Section, vol 58
Mandel MJ, Irene MK (1999) The Internet economy: the World’s next growth engine. Businessweek Online. October 4, 1999 Issue
Mele S (2012) Cyber law: navigating the legalities of digital weapons. Defence IQ. http://www.cdans.org/uploadedFiles/Article-Cyber-Law-Stefano-Mele-Oct2012.pdf
Mele S, Stinissen J, Belardetti G (2013) International regulation of cyber warfare. Report. Atlantic Treaty Association
Military Command is Created for Cyber Security (2009) Wall Street Journal
More Intelligent, More Effective Cyber-Security Protection (2013) Business Roundtable. http://businessroundtable.org/uploads/studies-reports/downloads/More_Intelligent_More_Effective_Pre-Publication.pdf?utm_source=twitterfeed&utm_medium=twitter
Nakashima E (2014) Senate intelligence panel advances cybersecurity bill. Washington Post. http://www.washingtonpost.com/blogs/the-switch/wp/2014/07/08/senate-intelligence-panel-advances-cybersecurity-bill/
Obama Outlines Coordinated Cyber-Security Plan (2009) New York Times, as well as Obama Policy Review. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
Paganini P (2012) The rise of cyber weapons and relative impact on cyberspace. General Security. http://resources.infosecinstitute.com/the-rise-of-cyber-weapons-and-relative-impact-on-cyberspace/
Paganini P (2014a) Dragonfly gang is targeting western energy industry. http://securityaffairs.co/wordpress/26273/cyber-crime/dragonfly-gang-energy-industry.html
Paganini P (2014b) Cyber espionage campaign based on Havex RAT hit ICS. SCADA systems. http://securityaffairs.co/wordpress/26092/cyber-crime/cyber-espionage-havex.html
Palace Calls for End to Cyber-Attacks Over Panatag Shoal Row (2012) LBG/HS, GMA News
Perlroth N, Hardy Q (2013) Bank hacking was the work of Iranians, officials say. New York Times. Technology Section
Samuel C (2012) Emerging trends in cyber security. IDSA COMMENT
Sanger DE (2012) Obama order sped up wave of cyberattacks against Iran. New York Times at A1. http://www.asil.org/insights120620.cfm
Tiku N (2010a) Who are those ‘Anonymouys’ WikiLeak hacktivists? Daily intelligencer. New York News and Politics. http://nymag.com/daily/intelligencer/2010/12/who_are_those_anonymous_wikile.html
Tiku N (2010b) Hackers take down mastercard in revenge for blocking WikiLeaks. http://nymag.com/daily/intelligencer/2010/12/hackers_take_down_mastercard_i.html
Wolf J (2012) U.S.–China economic and security review commission urges congress to probe China’s cyber attacks. Huffpost Tech
Yarnell M (1998) Your first year in network marketing: overcome your fears, experience success, and achieve your dreams. Prima, Rocklin
Zhang Y (2003) Internetworking and computing over satellite networks. Kluwer Academic, Berlin
Acknowledgments
This report is dedicated to those in government, business, academic, and non-profit communities who protect our sensitive information/data against cyber-attacks and to all of our citizens who ensure the safety and integrity of corporate and institutional databases and through that, the strength of our nation. As the principal author, I have drawn on the work of my peers and colleagues, but there are several to whom I am particularly indebted for their insight on how best to formulate and effectively use key International Law Principles in the new cyberdomain. They are Nitasha Tiku, Melissa Hathaway, Stefano Mele, Pierluigi Paganini, LTC Jan Stinissen, and Suzanne Kelly. I am grateful to Springer Journals Production Editor Noorjahan Ram and her support team who worked with me on the references and footnotes. The most important acknowledgement comes last. My wife, Julie Binder Maitra, has aided me beyond measure. She is my most demanding critic for consistency and traceability of the key points offered in the entire manuscript. She has to be admired and recognized for reading the manuscript several times and for her continued editorial assistance. Revisions and later drafts were largely mine; hence I must assume full responsibility for all erroneous statements and other shortcomings.
Disclaimer
The work on this paper represents the author’s own research and observations and does not reflect any US government agency position vis-à-vis international cyber-law, strategy, and policy.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Maitra, A.K. Offensive cyber-weapons: technical, legal, and strategic aspects. Environ Syst Decis 35, 169–182 (2015). https://doi.org/10.1007/s10669-014-9520-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10669-014-9520-7