Finnish Yearbook of International Law 2019
DOI: 10.5040/9781509927180.0006
|View full text |Cite
|
Sign up to set email alerts
|

Proving a State’s Involvement in a Cyber-Attack: Evidentiary Standards before the ICJ

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…2) as an exercise of the right of self-defence, or 3) as a reaction out of necessity. Given that most cyber operations happen below the threshold of an armed attack 6 (only in case of the latter would a state be able to respond in self-defence 7 ), it makes sense to take a look at countermeasures first before addressing self-defensive measures. "Necessity" as a response option should be seen as a last resort, given the high threshold and non-reliance on attribution (on these criteria, see in detail below).…”
Section: Introductionmentioning
confidence: 99%
“…2) as an exercise of the right of self-defence, or 3) as a reaction out of necessity. Given that most cyber operations happen below the threshold of an armed attack 6 (only in case of the latter would a state be able to respond in self-defence 7 ), it makes sense to take a look at countermeasures first before addressing self-defensive measures. "Necessity" as a response option should be seen as a last resort, given the high threshold and non-reliance on attribution (on these criteria, see in detail below).…”
Section: Introductionmentioning
confidence: 99%