2012
DOI: 10.2139/ssrn.2154938
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attacks: Proportionality and Precautions in Attack

Abstract: I. INTRODUCTION hen David Sanger 1 and Ellen Nakashima 2 officially broke the news that the United States and Israel had been involved in a long-term collaborative cyber operation focused on Iran and its nuclear development capabilities, they only confirmed what many had assumed for some time.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This fairly new trend raises the question of the application of international law in cyber warfare operations. Related to this challenge is the principle of proportionality in warfare strategy (Goldsmith 2013;Jensen 2012). Since most offensive cyber operations do not lead to destruction, it is difficult to effectively assess the real consequences of a cyber attack and what is considered a prohibited response (for instance, retaliating by disabling a country's energy network that supplies a large population in a cold winter).…”
Section: Emerging Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…This fairly new trend raises the question of the application of international law in cyber warfare operations. Related to this challenge is the principle of proportionality in warfare strategy (Goldsmith 2013;Jensen 2012). Since most offensive cyber operations do not lead to destruction, it is difficult to effectively assess the real consequences of a cyber attack and what is considered a prohibited response (for instance, retaliating by disabling a country's energy network that supplies a large population in a cold winter).…”
Section: Emerging Challengesmentioning
confidence: 99%
“…Obama further offered some examples and articulated that the US government is certain that a number of Internet break-ins were from China. In fact, China's cyber attacks are not a new concern in either the United States or the international community (Jensen 2012;Preston 2012;Goldsmith 2013). The US government has long been aware that China wields formidable capabilities in the area of information warfare (Geers 2011;Poindexter 2013;Steinnon 2010;Jense 2002).…”
Section: Notesmentioning
confidence: 99%