Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/152507
|
Title: | 國際法下網路空間中的國家網路行動可課責性---Stuxnet案例 State Cyber Operations Accountability in Cyberspace under International Law: The Case of Stuxnet |
Authors: | 司馬法 Pratama, Naufal Bagus |
Contributors: | 陳貞如 Chen, Chen-Ju 司馬法 Naufal Bagus Pratama |
Keywords: | 網絡空間 網絡攻擊 網絡戰爭 使用武力 國家責任 Stuxnet Cyberspace Cyber Attack Cyber Warfare Use of Force State Responsibility Stuxnet |
Date: | 2024 |
Issue Date: | 2024-08-05 12:33:19 (UTC+8) |
Abstract: | 網路空間被稱為所謂的「第五」戰爭領域,國家可以透過它進行敵對行動,故現已成為國際關係的重要舞台。儘管國家和法律專家都網路領域應該受到國際法約束,但由於缺乏專門規範國家網路行為的國際網路法,如何應用這些法律和規範仍然是一個挑戰。此外,透過網路空間進行的國家活動可以輕易匿名進行,並且很難追溯到任何特定的行為者。例如2010年Stuxnet事件,其展示了在網路環境中嘗試應用現行法律的難題。Stuxnet是一次前所未有的網路攻擊,導致了實際的物理破壞,襲擊並癱瘓了伊朗的核設施。Stuxnet被認為是首次將網路武器化,即網路戰爭時代的開端。然而,該事件並沒有被正式歸咎於任何一方,也沒有任何一方聲稱對此負責。目前,隨著地區緊張局勢的發展,類似Stuxnet的網路攻擊可能再次發生。因此,透過利用規範性法律研究和使用二手資料來回答研究問題,本論文將分析國家應如何根據現行國際法對其網路行動承擔責任,特別參考2010年Stuxnet惡意軟體攻擊事件。本研究認為,即使國際法適用於網路空間,但應用於網路領域時仍然存在挑戰,因此敦促國家保持一致的做法,並呼籲建立一部規範國家行為者在網路空間活動的國際條約。 Cyberspace is being referred to as the so-called "fifth" domain of war, enabling the conduct of hostilities through it and now is a key arena for international relations, including cyber warfare in conflicts among states. Although states and legal experts agree that international laws and norms apply to the cyber domain, yet with the absence of a cyber-specific international law that governs the State's operations within cyberspace, it is still a challenging task to apply it. Moreover, State activities conducted through cyberspace could easily be done anonymously and very hard to attribute to any particular actors. The Case of Stuxnet 2010 is a perfect example of the conundrum in terms of attempting the application of the prevailing laws to the cyber context. Stuxnet was an unprecedented cyber-attack that caused physical destruction, which hit and crippled Iranian nuclear facilities and is considered as the first utilization of cyber-weapon and referred to as the very dawn of the age of the cyber war. Yet, It was left officially unattributed, and no parties claimed responsibility. Currently, with the development of the tensions within the region, the possibility of “another” Stuxnet is present. Therefore, by utilizing normative legal research and the use of secondary data to answer the research question, this thesis will analyze how states should be held accountable for their cyber operations with the application of the existing international law, with special reference to the case of the Stuxnet malware attack 2010. The thesis concludes that, even though international law applies to the realm of cyberspace, it poses challenges in its application to the cyber realm and therefore urges consistent state practices and calls for an international treaty on the State’s operations in cyberspace to be established. |
Reference: | Additional Protocol I, 1977, The Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts Adam Segal, 2014, "Axiom and the Deepening Divide in US – China Cyber Relations", Net Politics and Digital and Cyberspace Policy Program, Council on Foreign Relations, https://www.cfr.org/blog/axiom-and-deepening-divide-us-china-cyber-relations Ademola Abass, 2011, Complete International Law, New York, Oxford University Press, p.240. Advisory Service, 2004, What is International Humanitarian Law?, International Committee of Red Cross and Red Crescent (ICRC) Al Jazeera Staff, 2024, Iran attacks Israel with over 300 drones, missiles: What you need to know, Al Jazeera, https://www.aljazeera.com/news/2024/4/14/iran-attacks-israel-with-over-300-drones-missiles-what-you-need-to-know, accessed on 22 May 2024 Andrew C. Foltz, 2012, "Stuxnet, “Schmitt Analysis,” And The Cyber “Use Of Force” Debate", Joint Force Quarterly, Issue 67, 4th Quarter Andrew Luzzatto, 2022, "Regulating Cyber Warfare Through the United Nations", The Cyber Defense Review Andy Greenberg, 2012, ‘What Stuxnet’s Exposure As An American Weapon Means For Cyberwar’, Forbes, https://www.forbes.com/sites/andygreenberg/2012/06/01/what-stuxnets-exposure-as-an-american-weapon-means-for-cyberwar/?sh=72f8879254c3, accessed on 20 May 2024 Annegret Bendiek and Matthias Schulze, 2021, "Attribution: A Major Challenge for EU Cyber Sanctions: An Analysis of WannaCry, NotPetya, Cloud Hopper, Bundestag Hack and the Attack on the OPCW", SWP Research Paper, No. 11, Stiftung Wissenschaft und Politik (SWP), Berlin Anonymous, 2010, Debate Rages Over Iran's Nuclear Capability, Intentions, https://www.voanews.com/a/debate-rages-over-irans-nuclear-capability-intentions-91529714/116150.html, accessed on 19 May 2024 Anonymous, 2024, Iran’s President Ebrahim Raisi confirmed dead in helicopter crash, Aljazeera, https://www.aljazeera.com/news/2024/5/20/rescuers-say-no-sign-of-life-as-wrecked-helicopter-of-irans-raisi-found, accessed on May 20, 2024 Anonymous, 2024, Iran president and foreign minister killed in crash, BBC, https://www.bbc.com/news/articles/cpwwql21747o, accessed on May 20, 2024 Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, 2001 Author, 2011, Iran accuses Siemens over Stuxnet virus attack, Reuters, https://www.reuters.com/article/idUSTRE73G0NB/, accessed on 20 May 2024 Author, 2012, ‘Critical Analysis: Stuxnet Leaks: More than a Domestic Political Affair Denver Journal of International Law & Policy, https://djilp.org/critical-analysis-stuxnet-leaks-more-than-a-domestic-political-affair/, accessed on 20 May 2024 Brian M. Mazanec and Bradley A. Thayer, 2015, Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace, Palgrave Macmillan Bruce Schneier, 2010, The Story Behind The Stuxnet Virus, Forbes, https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html?sh=869bdeb51e83, Accessed on 19 May 2024 Charter of the United Nations, 1945 Chen, T. & Abu-Nimeh, S, 2011, "Lessons from Stuxnet", Computer, Vol. 44, No. 4 Chimène I Keitner, 2019, 'Attribution by indictment', American Journal of International Law Unbound, Vol. 113 Christian Payne & Lorraine Finlay, 2017, "Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack", The Geo. Wash. Int’l L. Rev, Vol. 49 Compendium of statements in explanation of position on the final report, 2021, Document A/AC.290/2021/INF/2 Cordula Droege, 2012, "Get off my cloud: Cyber warfare, international humanitarian law, and the protection of civilians", International Review of the Red Cross, Vol. 94, No. 886 Corfu Channel, Merits, ICJ Reports, 1949, p. 4, at p. 23 Constantine Antonopoulos, 2015, “State Responsibility In Cyberspace”, Research Handbook On International Law And Cyberspace, Chapter 3, pages 55-71, Edward Elgar Publishing. Cyberspace, Glossary, Tallinn Manual 2.0 Cyber Operations, Glossary, Tallinn Manual 2.0 Damien McGunniess, “How a Cyber-attack Transformed Estonia”, https://www.bbc.com/news/39655415, accessed on 3 May 2023 Daniel T. Kuehl, 2009, "CH 2: From Cyberspace to Cyberpower: Defining the Problem", Cyberpower and National Security, Potomac Books, Inc Dan Williams, 2010, EXCLUSIVE-Cyber takes centre stage in Israel's war strategy, Reuters, https://web.archive.org/web/20101001091330/http://www.alertnet.org/thenews/newsdesk/LDE68R0GB.htm, accessed on 20 May 2024 Danae Azaria, 2020, ‘Codification by Interpretation’: The International Law Commission as an Interpreter of International Law, The European Journal of International Law, Vol. 31 no. 1 David E. Graham, 2010, “Cyber Threats and the Law of War”, Journal Of National Security Law & Policy, Vol. 4, No. 87 David E. Singer, 2012, "Obama Order Sped Up Wave of Cyberattacks Against Iran", The New York Times, https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html, accessed on 8 May 2024 David Graham, 2010, ‘Cyber Threats and the Law of War’, Journal of National Security Law and Policy, Vol. 87, No. 91 David Kushner, 2024 ‘The Real Story of Stuxnet’, IEEE Spectrum, https://spectrum.ieee.org/the-real-story-of-stuxnet, accessed on 20 May 2024 Dawan Mohammed Jaza, 2019, "The Nature of International Responsibility of States in the Contemporary World Arena", Journal of University of Human Development (JUHD), Vol. 5, No. 4 Declaration on the Inadmissibility of Intervention into the Domestic Affairs of States and the Protection of Their Independence and Sovereignty, 1965, U.N. GA Res 2131(XX) Dr Jakob Kellenberger, 2012, “International Humanitarian Law and New Weapon Technologies: 34th Round Table on current issues of international humanitarian law”, International Review of the Red Cross, Vol. 94, No. 886 Duncan Hollis, 2007, ‘Why States Need an International Law for Information Operations’, Lewis & Clark Law Review, Vol. 11, No. 4 Elinor Mills, 2010, “Stuxnet: Fact vs. theory”, CNET, https://www.cnet.com/news/privacy/stuxnet-fact-vs-theory/, accessed on 19 May 2024 Eric Talbot Jensen, 2017, "The Tallinn Manual 2.0: Highlights And Insights", Georgetown Journal Of International Law Eugenio Lilli, 2021, "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence", Contemporary Security Policy, Vol. 42, No. 2 Evan Andrews, “Who Invented the Internet?”, https://www.history.com/news/who-invented-the-internet, accessed on 20 October 2023 Final Report, 2015, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Document A/70/174 Final Substantive Report, 2021, Open-ended working group on developments in the field of information and telecommunications in the context of international security, Document A/AC.290/2021/CRP.2 Flashpoint Intel Team, 2024, "Amid Escalating Iran-Israel Conflict, Understanding the Hybrid Nature of Cyber Threats", https://flashpoint.io/blog/iran-israel-conflict-cyber-threats/, accessed on 22 May 2024 François Delerue, 2020, Cyber Operations and International Law, "State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation", Cambridge University Press, p. 381-421. Gabcikovo-Nagymaros Project (Hungary/Slovakia), ICJ Reports, 1997, p. 7. At p. 38, para. 47 Gaby Portnoy, 2024, "Head of the Israel National Cyber Directorate Gaby Portnoy at the Cybertech Conference: The intensity of cyber attacks has increased threefold during the war", Israel National Cyber Directorate, https://www.gov.il/en/pages/cyber_tech_2024, accessed on 22 May 2024 General Assembly Resolution, 1990, U.N. Doc. A/RES/45/121 General Assembly Resolution, 2001, Responsibility of States for Internationally Wrongful Act, A/RES/56/83 General Assembly Resolution, 2001, U.N. Doc. A/RES/55/63 General Assembly Secretary-General, 2022, Report on Responsibility of States for internationally wrongful acts Compilation of decisions of international courts, tribunals and other bodies, A/77/74 General Commentary, 2001, Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 1949 Gregory Gromov, 2012, “History of Internet and World Wide Web - Roads and Crossroads of the Internet History”, http://www.netvalley.com/, accessed on 20 October 2023 Hancock, Beverly, 2002, An Introduction to Qualitative Research, Leicester, Trent Focus Group Heather Harrison Dinniss, 2012, Cyber Warfare and the Laws of War, Cambridge University Press Herbert S. Lin, 2010, Offensive Cyber Operations and the Use of Force, National Security Law & Policy, Vol. 4, No. 1 Hugo Grotius, 1965, De Jure Belli Ac Pacis John Markoff, “Before the Gunfire, cyberattacks”, https://www.nytimes.com/2008/08/13/technology/13cyber.html, accessed on 3 May 2023 ICJ, 1949, The Corfu Channel Case (UK v. Albania) ICJ, 1986, Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.) ICJ, 1996, Advisory Opinion, Legality of the Threat or Use of Nuclear Weapons ICJ, 2007, Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), Merits. ICRC Position Paper, 2020, “International humanitarian law and cyber operations during armed conflicts”, International Review of the Red Cross, Vol. 102, No. 913 ICRC, 2004, "What is International Humanitarian Law?", Advisory Service on International Humanitarian Law ICTY, 2000, Judgement, The Prosecutor v.Kupreškić et al. Ido Kilovaty, 2014, "Cyber Warfare and the jus Ad Bellum Challenges: Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare", American University National Security Law Brief, Vol. 5, Issue 1 International Criminal Tribunal for the Former Yugoslavia, 1999, Prosecutor v. Tadić, Case No. IT-94–1-A, Judgment, para. 120 International Law Commision, 1970, Yearbook of the International Law Commission, Volume II International Law Commission, Historical Antecedents, https://legal.un.org/ilc/ilcintro.shtml J. Crawford, 2002, The International Law Commission's Articles on State Responsibility: Introduction, Text, and Commentaries, Cambridge University Press, p. 140. Jakub Vostoupal, 2024, “Stuxnet vs WannaCry and Albania: Cyber-Attribution on Trial”, available at SSRN: https://ssrn.com/abstract=4729496 James P. Farwell and Rafal Rohozinski, 2011, “Stuxnet and the Future of Cyber War”, Survival, Vol. 53. No.1 Jarno Limnéll, Thomas Rid, 2014, “Is Cyberwar Real? Gauging the Threats”, Foreign Affairs, Vol. 93, No. 2, p. 166-168. Jason Barkham, 2002, Information Warfare And International Law On The Use Of Force, International Law And Politics, Vol. 34, No. 57 Jean S. Pictet, 1952, Commentary On The Geneva Convention For The Amelioration Of The Condition Of The Wounded And Sick In Armed Forces In The Field Jeremy Richmond, 2012, "Evolving Battlefields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict," Fordham International Law Journal, Vol.35, No. 3, 842-894. Jeremy Wright, 2018, "The UK Attorney General, Speech Delivered at Chatham House, London: Cyber and International Law in the 21st Century", Attorney General's Office, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century, accessed on 6 March 2024 JN Sakellariadis, 2022, Extending the ‘Attribution Problem’: Why Who-Based Attribution Is Insufficient to Deterring Cyberattacks, Journal of Information Warfare Joby Warrick, 2011, Iran Touts Major Advances in Nuclear Program, The Washington Post, https://www.washingtonpost.com/world/iran-touts-major-advances-in-nuclear program/2011/04/11/AFZ8cxMD_story.html, accessed on 19 May 2024 John Arquilla, 2013, ‘Twenty Years of Cyberwar’, Journal of Military Ethics John P Carlin, 2016, ‘Detect, disrupt, deter: A whole government approach to national security cyber threats’, Harvard National Security Journal, Vol. 7 John Richardson, 2011, “Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield”, Journal Of Computer & Information Law, Vol. 29, No. 1 John Richardson, 2011, Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield, John Marshall Journal of Computer and Information Law, Vol. 29(1), 1-28. Joint Publication 1-02, 2017, Department of Defense Dictionary of Military and Associated Terms Jon Gambrell, 2024, "Iran’s supreme leader tacitly acknowledges that Tehran hit little in its attack on Israel", AP, https://apnews.com/article/iran-israel-khamenei-mideast-66280e717d335afffd9e258a5985d50c, accessed on 22 May 2024 Jon Gambrell, 2024, Iran’s President, Foreign Minister And Others Found Dead At Helicopter Crash Site, State Media Says, APNews, https://apnews.com/article/iran-president-ebrahim-raisi-426c6f4ae2dd1f0801c73875bb696f48, accessed on May 20, 2024 Josh Fruhlinger, 2022, ‘Stuxnet Explained: The First Known Cyberweapon’, CSO, https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html, accessed on 20 May 2024 Jutta Brunnée, 2005, “International Legal Accountability Through the Lens of the Law of State Responsibility”, Netherlands Yearbook of International Law, Vol. 36 Karine Bannelier and Théodore Christakis, 2017, Cyber-Attacks. Prevention-Reactions: The Role of States and Private Actors, Les Cahires de la Revue Défense Nationale Keir Giles and Kim Hartmann, 2019, “Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict’, 11th International Conference on Cyber Conflict: Silent Battle, NATO CCD COE Publications, Tallinn Kim Zetter, 2014, ‘An Unprecedented Look at Stuxnet, the World’s First Digital Weapon’, Wired, https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/, accessed on 20 May 2024 Kim Zetter, 2014, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, Crown Publishers Kristen E Eichensehr, 2017, ‘Three Questions on the WannaCry Attribution to North Korea’, Just Security, https://www.justsecurity.org/49889/questions-wannacry-attribution-north-korea/, accessed on 22 May 2024 Kristen E Eichensehr, 2020, ‘The Law and Politics of Cyberattack Attribution’, UCLA Law Review, Vol. 520, No. 582. Kristen Eichensehr,2014, "Review of The Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013)", American Journal of International Law, Vol 108 Kubo Mačák, 2016, "Is the International Law of Cyber Security in Crisis?", 8th International Conference on Cyber Conflict, NATO CCD COE Publications Lianne J.M. Boer, 2019, "Lex lata comes with a date; or, what follows from referring to the “Tallinn Rules.” AJIL Unbound, Vol. 113 Lorraine Finlay and Christian Payne, 2019 ‘The attribution problem and cyber armed attacks’, American Journal of International Law Luis Acosta, 2015, Legal Effect of United Nations Resolutions Under International and Domestic Law, The Law Library of Congress, Global Legal Research Directorate Major Aaron D. Kirk, 2019, “Artificial Intelligence And The Fifth Domain”, Air Force Law Review, 183-236 Marco De Falco, 2012, "Stuxnet Facts Report: A Technical and Strategic Analysis", NATO Cooperative Cyber Defence Centre of Excellence, Tallinn. Marco Roscini, 2015, Cyber Operations as a Use of Force Marco Sassòli, et all, 2011, How Does Law Protect In War?, Chapter 9: Conduct of Hostilities, Means and Methods of Warfare, ICRC Martin Dixon, 2013, Textbook on International Law, United Kingdom, Oxford University Press, p. 252. Matthew C. Waxman, 2011, "Cyber Attacks as "Force" Under UN Charter Article 2(4)", Faculty Publications, Columbia Law School Matthew J. Sklerov, 2009, Solving The Dilemma Of State Responses To Cyberattacks: A Justification For The Use Of Active Defenses Against States Who Neglect Their Duty To Prevent, 57th Judge Advocate Officer Graduate Course Marko Divac Öberg, 2006, "The Legal Effects of Resolutions of the UN Security Council and General Assembly in the Jurisprudence of the ICJ", The European Journal of International Law, Vol. 16, No.5 McConville, Mike and Wing Hong Chui, 2012, Research Methods for Law, Edinburgh, Edinburgh, University Press Michael G. Vickers & Robert C. Martinage, 2004, The Revolution in War, Center for Strategic and Budgetary Assessments, Washington DC Michael J Glennon, 2013, ‘The dark future of international cybersecurity regulation’, Journal of National Security Law & Policy, Vol. 6 Michael N. Schmitt, 2003, “The Sixteenth Waldemar A. Solf Lecture in International Law,” Military Law Review, Vol. 176 Michael N. Schmitt, 2012, "International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed", Harvard International Law Journal Online, Vol. 54 Michael N. Schmitt, 2013, Tallinn Manual on The International Law Applicable to Cyber Warfare, Cambridge University Press Michael N. Schmitt, 2015, "The Law of Cyber Targeting", NATO CCD COE, Tallinn Paper No. 7 Michael N. Schmitt, 2017, Tallinn Manual 2.0 On The International Law Applicable To Cyber Operations, Cambridge University Press Michael N. Schmitt, 2017, "Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t", Just Security, https://www.justsecurity.org/37559/tallinn-manual-2-0-international-law-cyber-operations/ Michael N. Schmitt; Sean Watts, 2015, "The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare," Texas International Law Journal, Vol. 50, No. 2-3 Michael Robinson, Kevin Jones, and Helge Janicke, 2014, "Cyber warfare: Issues and challenges", Computers & Security, Vol. 49 Michael Schmitt, 1999 ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’, Columbia Journal of Transnational Law, Vol. 37, 1998-99 Mitchell Stapleton-Coory, 2019, The Enduring Legacy Of The Martens Clause: Resolving The Conflict Of Morality In International Humanitarian Law, Adelaide Law Review, Vol. 40, No. 2 Nicholas Tsagourias and Michael Farrell, 2020, ‘Cyber attribution: Legal and technical approaches and challenges’, European Journal of International Law, Vol. 31, No. 3 Nicolas Falliere, Liam O Murchu, and Eric Chien, 2011, “W32.Stuxnet Dossier”, Symantec Security Response Oliver Kessler And Wouter Werner, 2013, Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare, Leiden Journal of International Law, Vol. 26 Oona A. Hathaway and others, 2012, "The Law of Cyber-Attack", California Law Review, Vol. 100 Oscar Schachter, 1984, "The Right of States to Use Armed Force", Michigan Law Review, Vol. 82, Issue 5 Parisa Hafezi and Yomna Mohamed, 2024, Iranian President Ebrahim Raisi killed in Helicopter Crash, Reuters, https://www.reuters.com/world/middle-east/hopes-fade-wreckage-found-helicopter-carrying-iranian-president-raisi-2024-05-20/, accessed on 20 May, 2024: Paul B. Stares & General John W. Vessey, 2024, “Preventive Priorities Survey”, Center for Preventive Action Phosphates in Morocco, Preliminary Objections, 1938, P>C.I.J., Series A/B, No. 74, p.10. Preventive Priorities Survey, 2024, “Conflicts to Watch in 2024”, Council on Foreign Relations, https://www.cfr.org/report/conflicts-watch-2024, accessed on 22 May 2024 Prosecutor v. Tadic, 1995, Case No. IT-94-1, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, Para. 70 Rain Liivoja. 2015, “Technological Change and the Evolution of the Law of War”, International Review of the Red Cross, Vol. 97, No. 900 Richard A. Clarke & Robert K. Knake, 2010, Cyber War: The Next Threat To National Security And What To Do About It, HarperCollins Publishers Rain Ottis, 2018, "Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective", Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia Report of the Secretary-General, 2017, Responsibility of States for internationally wrongful acts, Compilation of decisions of international courts, tribunals and other bodies, A/71/80/Add.1 Richard J. Harknett & Max Smeets,2 020, "Cyber Campaigns and Strategic Outcomes", Journal of Strategic Studies Rishi Iyengar, 2024, "The Next Israel-Iran Fight Could Be in Cyberspace", Foreign Policy, https://foreignpolicy.com/2024/04/16/iran-israel-conflict-missile-attack-cyberattacks-warfare/, accessed on 22 May 2024 Robert Rosenstock, 2002,”The ILC and State Responsibility”, The American Journal of International Law, Vol. 96, No. 4, p. 792-797. Rohit Bokil, 2023, Cyber Warfare: Taking War to Cyberspace and its Implications for International Humanitarian Law, International Journal for Multidisciplinary Research, Volume 5, Issue 1 Rupert Ticehurst, 1997, The Martens Clause and the Laws of Armed Conflict, International Review of the Red Cross, No. 317 Ryan Jenkins, 2013, Is Stuxnet Physical? Does It Matter?, Journal of Military Ethics, Vol. 12, No.1 Samuli Haataja and Afshin Akhtar-Khavari, 2018, “Stuxnet And International Law On The Use Of Force: An Informational Approach”, Cambridge International Law Journal Sean Seddon and Daniele Palumbo, 2024, "What we know about Israel's missile attack on Iran", BBC, https://www.bbc.com/news/world-middle-east-68853402, accessed on 22 May 2024 Shaan Shaikh, 2024,”The Iran-Israel Air Conflict, One Week In”, Center for Strategic & International Studies, https://www.csis.org/analysis/iran-israel-air-conflict-one-week, accessed on 22 May 2024 Shan Ali and Sabira Naz Qureshi, 2022, Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict, Journal of Development and Social Sciences, Vol. 3, No. 2 Sharon Wrobel, 2024, "Cyberattacks by Iran, Hezbollah have tripled during the war, says Israel cyber czar" The Times of Israel, https://www.timesofisrael.com/cyberattacks-by-iran-hezbollah-have-tripled-during-the-war-says-israel-cyber-czar/, accessed on 22 May 2024 Statute of the International Law Commission, 1947 Stephen M. Schwebel, 1979, "The Effect of Resolutions of the U.N. General Assembly on Customary International Law," Proceedings of the Annual Meeting (American Society of International Law), Vol. 73 Sean Collins & Stephen McCombie, 2012, “Stuxnet: the emergence of a new cyber weapon and its implications”, Journal of Policing, Intelligence and Counter Terrorism, 7:1, 80-91. Vaibhav Sharma, 2019, “Can Existing International Law Regulations and Cyber Operations Meet at a Junction?”, Journal of Emerging Technologies and Innovative Research, Vol. 6 Statista, “Numbers of Internet Users Worldwide”, https://www.statista.com/study/12322/global-internet-usage-statista-dossier/ accessed on 9 January 2023 Stefano Mele, 2014, “Legal Considerations on Cyber-Weapons and Their Definition”, Journal of Law & Cyber Warfare, Vol. 3, No. 1 Tainyi Luor and others, 2023, "Trends in and Contributions to Tallinn Manual Research: An Assessment of the Literature from 1998 to November 2022", Informatica Economică, Vol. 27, No. 3 Ted Regencia, 2024, Iran Helicopter Crash Updates: President Raisi, FM Amirabdollahian Die, Aljazeera, https://www.aljazeera.com/news/liveblog/2024/5/19/iran-helicopter-accident-live-president-fm-on-missing-aircraft, accessed on May 20, 2024 Thomas Rid & Peter McBurney, 2012, Cyber-Weapons, The RUSI Journal, Vol. 157, No. 1 The Budapest Convention on Cybercrime 2001 The Factory at Chorzów (Claim for Indemnity) (Germany v. Poland) [1928] PCIJ Ser A No 17, 29 The Joint Chiefs of Staff (JCS), 2018, Joint Publication 3-12 Cyberspace Operations The North Atlantic Council, North Atlantic Treaty Organization, 2014, “Wales Summit Declaration”, Press Release, https://www.nato.int/cps/en/natohq/official_texts_112964.htm The North Atlantic Treaty, 1949 The White House, 2009, ‘Remarks by the President on Securing our Nation’s Cyber infrastructure’, Office of the Press Secretary, https://obamawhitehouse.archives.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure , accessed on 19 May 2024 The White House, 2011, International Strategy for Cyberspace, National Archives, Washington D.C., https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf Thomas M. Franck, 2004, Recourse To Force: State Action Against Threats And Armed Attacks, Cambridge University Press Tian Shaohui, 2017, “China’s International Strategy of Cooperation on Cyberspace”, available at http://www.xinhuanet.com/english/china/2017-03/01/c_136094371.htm Tom Gjelten, 2012, ‘Cyber Insecurity: U.S. Struggles to Confront Threat’, NPR.org, http://www.npr.org/templates/story/story.php?storyId=125578576 US Department of Defense, 2006, The National Military Strategy for Cyberspace Operations. William Gibson, 1984, Neuromancer UN GA Resolution, 2015, Developments in the field of information and telecommunications in the context of international security, Document A/RES/70/237 UN GA Resolution, 2018, Developments in the field of information and telecommunications in the context of international security, Document A/RES/73/27 U.N. Security Council Resolutions 1737 (2006) U.N. Security Council Resolutions 1747 (2007) U.N. Security Council Resolutions 1803 (2008) U.N. Security Council Resolutions 1929 (2010). UK Cabinet Office, 2022, "Government Cyber Security Strategy: 2022 to 2030", available at https://www.gov.uk/government/publications/government-cyber-security-strategy-2022-to-2030 UN General Assembly Resolution, 2003. Developments in the field of information and telecommunications in the context of international security, Document A/RES/58/32 Vincent Bernard, 2014, "Delineating The Boundaries Of Violence", International Review of the Red Cross, Vol. 96, No. 893 William C Banks, 2019, ‘The bumpy road to a meaningful international law of cyber attribution’, American Journal of International Law Unbound, Vol. 113 William J Broad, John Markoff and David E Sanger, 2010, ‘Israeli Test on Worm Called Crucial in Iran Nuclear Delay’, The New York Times, https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html, accessed on 20 May 2024 Yoram Dinstein, 2011, War, Aggression and Self-Defence (5th Ed), Cambridge University Press Zen Chang, 2017, "Cyberwarfare and international humanitarian law", Creighton International and Comparative Law Journal, Vol.9, No. 1 |
Description: | 碩士 國立政治大學 國際研究英語碩士學位學程(IMPIS) 111862023 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0111862023 |
Data Type: | thesis |
Appears in Collections: | [國際研究英語碩士學位學程] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
202301.pdf | | 1194Kb | Adobe PDF | 1 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|