State Responsibility for Cyber Attacks Competing Standards for a Growing Proble

Literature review highlighting original contribution. A brief summary of the science of tracing cyber attack. The fundamental issue of attribution and the case for the overall control standard. Cyber conflicts and The North Atlantic Treaty Organization.

Ðóáðèêà Ãîñóäàðñòâî è ïðàâî
Âèä ñòàòüÿ
ßçûê àíãëèéñêèé
Äàòà äîáàâëåíèÿ 23.12.2015
Ðàçìåð ôàéëà 30,2 K

Îòïðàâèòü ñâîþ õîðîøóþ ðàáîòó â áàçó çíàíèé ïðîñòî. Èñïîëüçóéòå ôîðìó, ðàñïîëîæåííóþ íèæå

Ñòóäåíòû, àñïèðàíòû, ìîëîäûå ó÷åíûå, èñïîëüçóþùèå áàçó çíàíèé â ñâîåé ó÷åáå è ðàáîòå, áóäóò âàì î÷åíü áëàãîäàðíû.

Ðàçìåùåíî íà http://www.allbest.ru/

STATE RESPONSIBILITY FOR CYBER ATTACKS: COMPETING STANDARDS FOR A GROWING PROBLEM

Scott J. Shackelforda, Department of Politics and International Studies, University of Cambridge, 17 Mill Lane, Cambridge, CB2 1RX, UNITED KINGDOM, Email: ss645@cam.ac.uk.

aUniversity of Cambridge, Cambridge, UK

Abstract

This Article reviews both the applicability and desirability of the two vying regimes for state responsibility under international law as applied to cyber attacks: the e?ective and overall control standards. Due to the tech- nical di?culties with proving attribution for cyber attacks, along with the unreasonably high burden of proof required by the ICJ's interpretation of the e?ective control standard, this Article argues for the adoption of the overall control standard as being both within the best interests of NATO as well as the international community.

Keywords: state responsibility, cyber attacks, international law, NATO, cyber security

Introduction

At a time in which the unchecked sovereign authority of States is being challenged across many arenas, State responsibility remains a key bulwark of international security (Held, 2006, p. 293-97; Reich, 1991). But constructing a viable regime to de?ne State responsibility in international law has proven to be elusive. Instances of State-sponsored terrorist acts have increased since the end of the Cold War, but proving State responsibility for such acts remains exceedingly di?cult (Brenner & Crescenzi, 2006, p. 398; Burgess 2006, p. 302; Joyner & Rothbaum, 1993, p. 229). This problem is magni?ed in cyberspace by the speed and anonymity of cyber at- tacks, making according to the White House “distinguishing among the actions of terrorists, criminals, and nation States di?cult.” (National Strategy to Secure Cyber- space, 2003, p. 19 & p. 64). As seen in the 2007 cyber attack on Estonia, a potential sponsoring State may not cooperate in the investigation, apprehension, and extradi- tion of those who committed criminal or terrorist acts on its behalf (Davis, 2007). Given the clandestine nature of cyberspace, States may thus incite civilian groups within their borders to commit cyber attacks and then hide behind a, however sheer, veil of plausible deniability and thus escape accountability.

This Article analyzes the two primary legal regimes of State responsibility for cyber attacks that could mitigate such State sponsorship: the e?ective and overall control standards. In brief, the e?ective control doctrine, originating in the International Court of Justice (ICJ) Nicaragua case, recognizes a country's control over paramili- taries or other non-State actors only if the actors in question act in “complete depen- dence” on the State (Nicaragua v. United States, 1986, p. 110). In contrast, the overall control doctrine, illustrated in the International Criminal Tribunal for the Former Yugoslavia Tadic case, held that where a State has a role in organizing and coordi- nating, in addition to providing support for a group, it has su?cient overall control such that the group's acts are attributable to the State (Prosecutor v. Tadic, 1995). This Article argues for the adoption of the latter standard of State responsibility for cyber attacks given the extreme technical di?culties involved with proving the identity of cyber attackers.

The Article is structured as follows. Part I constitutes a brief literature review on the question of appropriate standards of State responsibility for cyber attacks, taking special note of the unique scholarly contribution of this Article. Part II summarizes some of the myriad technical challenges raised by tracing cyber attacks. Part III dis- cusses the fundamental problem of attribution as well as the cases for and against the e?ective and overall control standards of State responsibility for cyber attacks. Finally, Part IV demonstrates how de?ning State responsibility is critical within the context of NATO's cyber security strategy.

1. Literature review highlighting original contribution

The literature to date has only obliquely dealt with the issue of State responsibility for cyber attacks in international law. Some works note that armed coercion is gen- erally chargeable to States more so than other forms of coercion, but do not address the degree of proof needed to constitute State responsibility (Schmitt, 1998, p. 885). Other articles adopt Nicaragua's framework as applied to non-State actors, but not necessarily States (Schapp, 2009, p. 145). Much of the rest of the existing scholar- ship focuses on cyber terrorism by non-State actors, such as Verton (2003) or Ryan (2007). The one recent collection of essays on cyber warfare entirely ignores the topics of State responsibility, attribution, sovereignty and management of the infor- mation commons, all of which are central to countering cyber attacks (Janczewski & Colarik, 2008). There is thus a paucity of literature dealing with cyber attacks from the lens of international law and relations, to say nothing of the ethical and human rights implications of cyber attacks on national and international security (Wolf, 2000, p. 95; Yang, 2006, p. 201). Treatments of cyber attacks and information war- fare outside the orthodox international humanitarian law framework are also nearly non-existent (Hanseman, 1997, p. 173). In particular, the literature to date has been silent on the appropriate legal regime to use as a baseline for regulatory responses to cyber attacks despite the fact that a developed system of treaties on the law of war now governs many aspects of the conduct of modern warfare, from weapons of mass destruction to the treatment of POWs and non-combatants.2 The United States, for example, is party to eighteen law-of-war treaties. For a survey, see U.S. Department of State, Treaties in Force, 2007, available at: http://www.state.gov/s/l/treaty/treaties/2007/index. htm.

Nor has the growing literature on the rise of Internet law and the information com- mons applied its ?ndings to the question of State responsibility for cyber attacks (Hunter, 2003; Johnson & Post, 1996, p. 1367; Lessig, 1999, p. 500). Even those recent works that do address cyber attacks and critical infrastructure protection do so primarily from a U.S.-centric vantage point, such as Cordesman (2002), or Lulasik (2003). Consequently, there is an important gap in the international law literature that this work addresses by explicitly laying out the cases for and against each potential regime of State responsibility for cyber attacks, analyzing the relative strengths and weaknesses in the context of NATO operations, and making a case for the adoption of the overall control standard. Before the respective options for State responsibility are examined though, ?rst a brief introduction of the technical chal- lenges of tracking cyber attacks is warranted.

2. A brief summary of the science of tracing cyber attacks

The science of tracing cyber attacks is primitive at best. Sophisticated attacks by knowledgeable hackers, whether private or State-sponsored, are nearly impossible to trace to their source using modern practices (Lipson, 2002). The current founda- tion of network communications in cyberspace, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), dates back to 1982 (Lipson, 2002, p. 5). It is this antiquated system of communication designed for a small number of academic and governmental researchers sharing information with low risks of system breaches, which is at the heart of the problem for tracing cyber attacks (Lipson, 2002, p. 14). Though, of course, this is not the only problem?system vulnerabilities are multi- plied when considering the myriad problems with often rushed to market commer- cial o?-the-shelf software. Other issues include the facts that: the Internet was never designed to track or trace users, or to resist untrustworthy users; a packet's source address itself is untrustworthy and is easily masked; the current threat environ- ment in cyberspace exceeds the Internet's design parameters; and there are myriad strategies that hackers employ making tracking di?cult, such as tunneling and the destruction of data logs. But the overarching issue is that the current system was designed for a small number of trustworthy and tech-savvy researchers, which is simply no longer the case with more than a billion Internet users worldwide (Inter- net: General Usage Statistics, 2003).

Can the cyber infrastructure be modernized to enhance security and stop cyber attacks once and for all? The short answer is yes, but not easily. Certain strategies pioneered by the U.S. Cyber Emergency Response Team (USCERT) are promising, such as the use of probabilistic traceback techniques to audit a small percentage of packets so as to ?nd the source of major distributed denial-of-service (DDoS) at- tacks of the kind that Estonia su?ered in March 2007 (Hughes, 2009). There is also the possibility of tracing back single IP packets, though this is much more di?cult (Lipson, 2002, p. 27). A full review of the myriad technical issues and their potential solutions is beyond the scope of this Article. Su?ce it to say though, ultimately these technical countermeasures will never o?er a complete solution to the problem of cyber attacks. Cyberwarfare is an arms race that cannot be won by defense alone. In the end, these attacks will likely continue to proliferate both in numbers and sever- ity; the question then is how best they should be dealt with in international law and relations.

3. The fundamental issue of attribution and the case for the overall control standard

Attribution of a cyber attack to a State is a, if not the, key element in building a func- tioning legal regime to mitigate these attacks. The laws of war requires one State to identify itself when attacking another State, though this convention is honored more in the breach than in compliance (Brenner, 2006, p. 398; The Hague Convention Rel- ative to the Opening of Hostilities, 1910, art. I). When there is a question about State sponsorship of aggression, two competing standards for State responsibility now exist in international law under Article VIII of the International Law Commission's Draft Articles on the Responsibility of States for International Wrongful Acts. Article VIII implicates State control when State actors or o?cial organs are acting under the direction of the State (Responsibility of States for Internationally Wrongful Acts, 2001). An exact de?nition of `control,' however, has been left up to the courts to in- terpret. The ?rst standard that the courts have created is the ICJ Nicaragua e?ective `operational control' standard (Nicaragua v. United States, 1986, p. 392). Nicaragua requires that a country's control over paramilitaries or other non-State actors can only be established if the actors in questions act in “complete dependence” on the State. The second standard is the ICTY Tadic `overall control' standard. The ICTY held that where a State has a role in organizing and coordinating, in addition to providing support for a group, it has su?cient overall control, and the group's acts are attributable to the State (Prosecutor v. Tadic, 1995, para. 70). In so ?nding, the majority interpreted the decision of the ICJ in Nicaragua as requiring the govern- ment of a State to exercise “e?ective” control over the operations of a military force in order for the acts of that force to be imputed to the State (Pronk, 1997). cyber attack conflict control

The most recent case in which the ICJ reviewed the competing standards of State responsibility was the Application of the Genocide Convention (“Bosnian Genocide”). There, the Court adopted the e?ective control rather than the overall control stan- dard in deciding that Bosnia lacked the speci?c intent to commit genocide (Bosnia and Herzegovina v. Serbia and Montenegro, 2007; Cassese, 2007). In essence, the Court required “smoking-gun” evidence or its equivalent (Luban, 2007, p. 30). The standard laid down by the Court was beyond any doubt, not beyond a reasonable doubt. This distinction is signi?cant enough to potentially have been dispositive of the case's outcome, just as it is for holding State sponsors of cyber attacks account- able. Future cases will also likely turn on this distinction, necessitating an in depth analysis of the bene?ts and drawbacks of each standard for State responsibility.

3.1 The case against the effective control standard

As a result of the divergence in international law on the issue of State responsibility, there are two competing standards emerging for cyber attacks: the e?ective control standard applicable to non-State actors, and both the e?ective and overall control standards applicable to State sponsors of cyber attacks. For non-State actors, the ICJ held in Nicaragua that e?ective control was the appropriate standard to apply at least in the paramilitary context of that case (Capaldo, 2007, p. 104). If this decision were to be extended to cyber militia, it would mean that the only instance in which State sponsors of cyber attacks would be held accountable for their involvement would be if their e?ective control could be proven beyond any doubt. Given what has been demonstrated about the extreme technical di?culties of proving the identity of cyber attacks due to the nature of the Web's architecture, such a standard would in essence give a free pass to State sponsors of cyber attacks. In a sophisticated global cyber attack, missing or corrupted data commands may be su?cient to dis- prove State control and defeat accountability. Without either new techniques such as the probabilistic tracing project mentioned in Part II, or very unsophisticated hackers, e?ective control would make State responsibility for cyber attacks virtually a non-starter.

There are other important drawbacks to adopting the ICJ's Nicaragua formulation with regards to proving State responsibility for cyber attacks, among them being the fact that the Court divided the use of force into “most grave” and “less grave” catego- ries (Nicaragua v. United States, 1986, p. 101). This distinction has split commenta- tors. Some see this view as formalistic and restrictive, and according to Gray (2000,

p. 141) it “will encourage aggression of a low-key kind.” Others see a low threshold of armed attack mixed with collective self-defense as a recipe for the internationaliza- tion of civil con?icts (Watkin, 2004, p. 5). As applied to cyber attacks, this doctrine could arguably give low-level cyber attacks, potentially up to and including the cy- ber attacks on Estonia, a pass at least as applied to international humanitarian law. This could encourage criminals, if all they have to worry about is law enforcement, and not the armed forces. Instead, and while the law of cyberwarfare remains mal- leable, the overall control standard should be adopted.

3.2 The case for the overall control standard

The ICJ has consistently used the more restrictive e?ective control standard in its jurisprudence, most recently in Bosnian Genocide, but other tribunals, such as the ICTY, have not. Judge Antonio Cassese, the ?rst President of The Hague Tribunal, attacked the Bosnian Genocide judgment as demanding an “unrealistically high standard of proof” (Tosh, 2007). This burden of proof is nearly impossible to satisfy in the context of cyberspace without major improvements in the tracing of cyber at- tacks. As a result, if international law is to have su?cient applicability to cyberwar- fare, it is essential that the overall control standard be adopted as part of a future international regime for cyberspace. Currently the framework for how such a treaty would operate is being debated, for the ?rst time, by representatives of the United States and Russia. The two sides are far apart, but even preliminary discussions are encouraging (Marko? & Kramer, 2009). If these talks do bear fruit, their scope should be expanded to formulate a standard of State responsibility for cyber attacks.

Short of a new treaty on cyberspace, and alternatively to adopting the ICTY overall control standard, there is also precedent within the ICJ context itself to support a third more ?exible standard of State responsibility. Speci?cally, the ICJ held in the Iran hostage case that the actions of a State's citizens could be attributed to the government if the citizens “acted on behalf on [sic] the State, having been charged by some competent organ of the Iranian State to carry out a speci?c operation” (United States v. Iran, 1980, p. 29). There, while the Court did not ?nd enough evi- dence to attribute the actions of the citizens to the government, the Court did ?nd that the Iranian government was nonetheless responsible because it was aware of its obligations under the 1961 Vienna Convention on Diplomatic Relations and the 1963 Convention on Consular Relations to protect the U.S. embassy and its sta?, and failed to comply with its obligations (Barkham, 2001, p. 98).3 The Corfu Channel case should also be considered in this context. In that case, Albania mined the Corfu Strait, and the British Royal Navy sued for damages and loss of life that it sustained as a result of ships colliding with the mines. There, the ICJ stated: “…it cannot be concluded from the mere fact of the control exercised by a State over its territory and waters that that State necessarily knew, or ought to have known, of any unlawful act perpetrated therein.” (United Kingdom v. Albania, 1949, p. 30). Yet, even in Corfu Channel the Court noted that the standard of State responsibility should be somewhat ?exible when it stated, “…the other State, the victim of a breach of international law, is often unable to furnish direct proof of facts giving rise to responsibility. Such a State should be allowed a more liberal recourse to inferences of fact and circumstantial evidence.” (United Kingdom v. Albania, 1949, p. 30). This reasoning could be extended to cyber attacks in two ways. First, the standard could be adopted that, if the citizens of a State acted on behalf of a competent government organ, then the government could be vicariously liable for the resulting damage from such cyber attacks. Second, if there is insu?cient evidence to ?nd attribution outright, as there was in Iran hostage, then the standard could become one of governmental aware- ness, i.e. if the government was aware of its obligations under international law to prevent its citizens and information infrastructure from launching cyber attacks and failed to comply with these responsibilities. That State could then be held in breach of international law. Either the Tadic or Iran hostage standards has the bene?t of moving beyond the rigid e?ective control framework, and holding State sponsors of cyber attacks accountable when signi?cant evidence exists of their involvement.

Yet there are di?culties posed by adopting a standard of State responsibility with a lower burden of proof than e?ective control that should be addressed. Principal among these is the danger of prosecuting accused State sponsors of attacks that are in fact innocent. Politically, this worry may cause some countries to push for the higher burden of proof enshrined in the e?ective control standard so as not to be wrongly accused of sponsorship. Such critiques may in part be addressed though by a clari?cation that a requirement of `beyond a reasonable doubt' under the overall controls standard is still a very high burden of proof that the prosecut- ing entity must meet, making frivolous or unwarranted cases unlikely (Erikkson, 2004, p. 294). Other outstanding issues that demand attention include the necessity of de?ning the appropriate forum in which to bring a case against State sponsors of cyber attacks, with candidates ranging from the ICJ, to national courts, or special- ized tribunals.

In summary, it is far too easy for governments to hide their information warfare operations under the e?ective control standard. It should thus be su?cient as mat- ter of international law to prove overall control by a government in a cyber attack, rather than complete control. For example, if the overall control standard were used instead of e?ective control, it would be possible that Russian or Chinese incitement behind the cyber attacks on Estonia, Georgia, or the United States, if proven, would be su?cient to satisfy State attribution. A comprehensive future legal regime could grant Estonia, and other victim nations, adequate reparations for such attacks. But if e?ective control becomes the dominant paradigm for determining State responsibil- ity for cyber attacks, even a victim State of a worst-case scenario cyber attack may not receive justice. Alternatively, the ICJ precedent of Iran hostage could be used as another vehicle to hold State sponsors of cyber attacks accountable. But why is this distinction critical within the context of NATO's cyber security strategy?

4. Cyber conflicts and NATO

During the 2007 cyber attack on Estonia, several Estonian o?cials raised the issue of whether Article 5 of the North Atlantic Treaty Organization (NATO) could be in- voked, which maintains that an assault on one allied country obligates the alliance to attack the aggressor (North Atlantic Treaty, 1949 art. 5). This was the ?rst time in NATO history that a member State had formally requested emergency assistance in the defense of its digital assets (Hughes, 2009). Estonia did receive the limited help that it requested from NATO. Further assistance was unavailable since NATO and the international community alike viewed the 2007 cyber attacks on Estonia as an instance of cyber crime, or cyber terrorism (Koms & Kastenberg, 2008-09, p. 63).

This was also the case in the cyber attacks against Georgia, in which there was also no conclusive evidence that Russia was indeed behind the attacks (Schapp, 2009, p. 121). This was for two primary reasons. First, the attacks were not serious enough to constitute an armed attack thus activating NATO Article 5. Second, State respon- sibility for the attacks could not be conclusively proven. NATO has taken steps to address the gaps in cyber security strategy that the cyber attacks on Estonia un- derscored, such as by creating the Cooperative Cyber Defense Centre of Excellence in Tallinn, Estonia, and the new Cyber Defense Management Authority in Brussels, which is a NATO e?ort to centralize cyber defense capabilities (“NATO opens new centre of excellence on cyber defence,” 2008). But without a legal regime for State responsibility in place going forwards, such e?orts are by themselves insu?cient.

It is critical for NATO's future e?orts in cyber security for its member States to have a comprehensive and settled standard to gauge State responsibility for cyber attacks. Specialists at the CDMA, or at the various CERTs of the member States, will not be able to gather the necessary intelligence to prove which nation or group launched a given cyber attack if the standard of proof itself is left unde?ned. If the e?ective control standard is indeed accepted as the required standard for State responsibility, then information gathering would have to be total, necessitating new technologies capable of tracking individual packets conclusively back to their true source. Alter- natively, if the overall control standard is adopted by the international community, then signi?cant evidence beyond a reasonable doubt of State sponsorship or support for cyber attacks would be su?cient to hold accountable those States, or groups within those States, that launch cyber attacks against NATO member nations or businesses operating within member States.4 A recent well-publicized example of such a case was the cyber attack on Google in which there were questions over Chinese-government sponsorship (Shiels, 2010). Thus, it is in NATO's own best interests to have a standard of State responsibility for cyber attacks de?ned, and to push for the adoption of the overall control standard over the e?ective control standard.

Conclusion

The domestic and global implications of human society's increasingly critical depen- dence on the Internet makes necessary the ability to deter, detect, and minimize the e?ects of cyber attacks (Lipson, 2002, p. 3). Today, NATO and the United States alike are at the point of determining how the governance of cyberspace should develop, including in?uencing the vector of the jus ad bellum from the very inception of the legal framework for cyberwarfare. The strategies and practices that are assumed in the short-term thus will greatly impact how this fast evolving body of law is shaped (Schmitt, 2003, p. 415). The case has been made in this Article that there are currently two vying regimes for State responsibility under international law: the e?ective and overall control standards. Due to the technical di?culties with proving attribution for cyber attacks, along with the unreasonably high standards of proof imposed by the e?ective control standard, I have argued for the adoption of the overall control standard. This has the bene?t of holding State sponsors of cyber attacks accountable where there exists su?cient proof beyond a reasonable doubt, as opposed to beyond any doubt. Adopting the overall control standard for cyber attacks is thus both within the best interests of NATO and the international commu- nity. But determining a standard for State responsibility is only one part of promot- ing cyber security. There are a myriad of other related issues that deserve further research and attention by scholars and policymakers alike, such as determining the appropriate forum in which to prosecute State sponsors of cyber attacks.

References

Barkham, J., 2001. Information Warfare and International Law on the Use of Force. New York Univer- sity Journal of International Law and Policy, 34, Brenner 57-114.

• , S. W., & Crescenzi, A. C. 2006. State-Sponsored Crime: The Futility of the Economic Espionage Act, Houston Journal of International Law, 28, 389-464.

• Burgess, D. R., 2006. Hostis Humani Generi: Piracy, Terrorism and a New International Law, University of Miami International and Comparative Law Review, 13, 293-312.

• Capaldo, G. Z. 2007. Providing a Right of Self-Defense Against Large Scale Attacks by Irregular Forces: The Israeli-Hezbollah Con?ict, Harvard International Law Journal Online, 48, 101-112.

• Cassese, A. 2007. The Nicaragua and Tadic Tests Revisited in Light of the ICJ Judgment on Genocide in Bosnia, European Journal of International Law, 184, 649-668.

• Cordesman, J. 2002. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection.

• Westport: Praeger Publishers.

• Davis, J. 2007, August 21, Hackers Take Down the Most Wired Country in Europe. Wired Magazine, p. 9.

• Erikkson, S. 2004. Humiliating and Degrading Treatment under International Humanitarian Law: Criminal Accountability, State Responsibility, and Cultural Considerations, Air Force Law Review, 55, 269-311.

• Gray, C. 2000. International Law and the Use of Force. Oxford: Oxford University Press.

• Hague Convention No. III Relative to the Opening of Hostilities art. I, Oct. 18, 1907, 36 Stat. 2259, 2271, T.S. 598 1907, entered into force 26 Jan. 1910, art. 1.

• Hanseman, R. G. 1997. The Realities and Legalities of Inform The Realities and Legalities of Informa- tion Warfare, United States Air Force Law Review, 42, 173-200.

• Held, D. 2006. Models of Democracy. Cambridge: Polity Press.

• Hughes, R. B. 2009, April, NATO and Cyber Defence: Mission Accomplished?. NATO-OTAN.

• Hunter, D. 2003, Cyberspace as Place and the Tragedy of the Digital Anticommons, California Law Review, 91, 439-514.

• “Internet: General Usage Statistics,” http://www2.sims.berkeley.edu/research/projects/how-much- info-2003/internet.htm.

• Janczewski, L. & Colarik, A. M. 2008. Cyber Warfare and Cyber Terrorism, Cambridge: CUP, 2008.

• Johnson, D. & Post, D., 1996, Law and Borders ? The Rise of Law in Cyberspace, Stanford Law Review, 48, 1367-1402.

• Joyner, C. C. & Rothbaum, W. P., 1993, Libya and the Aerial Incident at Lockerbie: What Lessons for International Extradition Law?, Michigan Journal of International Law, 14, 220-260.

• Koms, S. W. & Kastenberg, J. E., 2008, Georgia's Cyber Left Hook, Parameteres?U.S. Army War Col- lege Quarterly, 38, 60-76.

• Lessig, L. 1999, The Law of the Horse: What Cyberspace Might Teach, Harvard Law Review, 113, 501-549.

• Lipson, H. F. 2002, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Is- sues, CERT Coordination Center.

• Luban, D. 2007, February 15, Timid Justice: The ICJ should have been harder on Serbia, Slate.

• Lulasik, S. 2003. Protecting Critical Infrastructures Against Cyber-Attack. Oxford: Oxford University Press.

• Marko?, J. & Kramer, A. E. 2009, December 12, In Shift, U.S. Talks to Russia on Internet Security, New York Times.

• Military and Paramilitary Activities Nicar. v. U.S. 1986 I.C.J. Rep. 14 Jun. 27.

• NATO 2008, May 20, NATO opens new centre of excellence on cyber defence, NATO News.

• North Atlantic Treaty art. 5, Apr. 4, 1949, 63 Stat. 2241U.N.T.S. 243.

• Pronk, R. J.P. 1997, ICTY Issues Final Judgment Against Dusan Tadic in First International War Crimes Tribunal Since World War II, Human Rights Brief, Center for Human Rights and Humanitarian Law.

• Prosecutor v. Tadic, Case No. IT-94-1-I, Decision on the Defense Motion for Interlocutory Appeal on Jurisdiction, ¶ 70 Oct. 2, 1995.

• Reich, R. B. 1991. The Work of Nations: Preparing Ourselves for 21st-Century Capitalism. New York: Vinage Press.

• Responsibility of States for Internationally Wrongful Acts, G.A. Res. 56/83, U.N. GAOR, 56th Sess., Supp. No. 10, U.N. Doc. A/56/10 Dec. 12, 2001.

• Russian-Estonian MLAT.

• Ryan, J. 2007. Countering Militant Islamist Radicalisation on the Internet: A User Driven Strategy to Recover the Web. Dublin: IIEA.

• Schmitt, M. N. 2003, The Sixteenth Waldemar A. Solf Lecture in International Law, Military Law Review, 176, 364-421.

• Schmitt, M. N. 1998, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Columbia Journal of Transnational Law, 7, 885-937.

• Schapp, A. J. 2009, Cyberlaw Edition: Cyber Warfare Operations, Development and Use Under Interna- tional Law, Air Force Law Review, 64, 121-173.

• Shackelford, S. J. 2010, Estonia Three Years Later: A Progress Report on Combating Cyber Attacks,

Journal of Internet Law, 138, 22-29.

• Shackelford, S. J. 2009, From Net War to Nuclear War: Analogizing Cyber Attacks in International Law,

Berkeley Journal of International Law, 25, 191-250.

• Shackelford, S. J. 2007, Holding States Accountable for the Ultimate Human Rights Abuse: A Review of the ICJ Bosnian Genocide Decision, Human Rights Brief, 14, 21-26.

• Shiels, M. 2010, 14 January, Security Experts say Google Cyber-Attack was Routine, BBC News.

• The Application of the Genocide Convention Case Bosnia and Herzegovina v. Serbia and Montenegro, 2007 I.C.J. 140 Feb. 26.

• The Corfu Channel Case United Kingdom-Albania, 1949 I.C.J. 4?.

• Tosh, C. 2007, March 2, Genocide Acquittal Provokes Legal Debate, Institute for War and Peace Re- porting.

• United States Diplomatic and Consular Sta? in Tehran U.S. v. Iran, 1980 I.C.J. 3, 29 May 24.

• U.S. Department of State 2007, Treaties in Force http://www.state.gov/s/l/treaty/treaties/2007/index. htm

• Verton, D. 2003. Black Ice: The Invisible Threat of Cyberterrorism. Cambridge: CUP.

• Watkin, K. 2004, Controlling the Use of Force: A Role for Human Rights Norms in Contemporary Armed Con?ict, American Journal of International Law, 98, 1-34.

• White House 2003. National Strategy to Secure Cyberspace, 19.

• Wolf, J. B. 2000, War Games Meets the Internet: Chasing 21st Century Cybercriminals With Old Laws and Little Money, American Criminal Law Review, 28, 95-117.

• Yang, D. W. 2006, Countering the Cyber-Crime Threat, American Criminal Law Review, 43, 201-215.

Ðàçìåùåíî íà Allbest.ru

...

Ïîäîáíûå äîêóìåíòû

  • Characteristics of the state apparatus Ukraine: the concept, content and features, fundamental principles of organization and operation of state apparatus. Structure of the state apparatus and its correlation with the mechanism of state.

    êóðñîâàÿ ðàáîòà [25,1 K], äîáàâëåí 08.10.2012

  • The concept and features of the state as a subject of international law. The sovereignty as the basis of the rights and duties of the state. Basic rights and obligations of the state. The international legal responsibility of states. Full list of rights.

    êóðñîâàÿ ðàáîòà [30,1 K], äîáàâëåí 17.05.2016

  • Problems of sovereignty in modern political life of the world. Main sides of the conflict. National and cultural environment of secessional conflicts. Mutual relations of the church and the state. The law of the Pridnestrovskaia Moldavskaia Respublika.

    ðåôåðàò [20,1 K], äîáàâëåí 10.02.2015

  • Understanding the science of constitutional law. Organization of state power and the main forms of activity of its bodies. The study of the constitutional foundations of the legal status of the citizen, local government. Research on municipal authorities.

    ðåôåðàò [15,3 K], äîáàâëåí 14.02.2015

  • The purpose of state punishment. Procedure of criminal case. The aim of punishment. Theories of Punishment. The Difficult Child. Last hired, first fired. The Health Professions. Traditional Collector's Editions. Hospital and Specialist Services.

    øïàðãàëêà [41,7 K], äîáàâëåí 23.03.2014

  • Consideration of sovereignty as a basic constitutional principles of state law (for example, the countries - members of the Commonwealth of Independent States). Legislative support in Ukraine national development in the socio-cultural (spiritual) sphere.

    ðåôåðàò [20,1 K], äîáàâëåí 13.02.2015

  • The steady legal connection of the person with the state, expressing in aggregate of legal rights and duties. The Maastricht Treaty of 1992. Establishment of the European Economic Community. Increase of the number of rights given to the citizens.

    ðåôåðàò [22,5 K], äîáàâëåí 13.02.2015

  • Ñritical comparison of Infrared analysis and Mass Spectrometry. Summary of the uses in forensic, the molecular structural mass spectral. The method provides better sensitivity in comparison. To conclude, both techniques are helpful in the forensic study.

    ðåôåðàò [20,1 K], äîáàâëåí 21.12.2011

  • The first steps promoting creation of the judicial organs of the constitutional control in the subjects of the Russian Federation. Creation of the constitutional (charter) courts. System of organization of the power in the subjects of the Federation.

    ðåôåðàò [17,4 K], äîáàâëåí 07.01.2015

  • The differences between the legal norm and the state institutions. The necessity of overcoming of contradictions between the state and the law, analysis of the problems of state-legal phenomena. Protecting the interests and freedoms of social strata.

    ñòàòüÿ [18,7 K], äîáàâëåí 10.02.2015

  • The nature and justification of fundamental legal changes in modern society due to the globalization of cultures and civilizations. Directions and features of Ukrainian law, the requirements for the cost of litigation and particularly its improvement.

    ðåôåðàò [18,4 K], äîáàâëåí 14.02.2015

  • Concept, importance of the Constitution as the fundamental law of the state, the history of development. Features of the constitutions of the leading powers of the European continent. Factors that influence the content of the Constitution of Bulgaria.

    ðåôåðàò [21,4 K], äîáàâëåí 14.02.2015

  • History of antitrust law. The Department of Justice building in Washington, D.C. as home to the United States antitrust enforcers. Federal and state government, private suits. Several examples of antitrust law: AT&T, Alcoa, Kodak and Standard Oil.

    ðåôåðàò [22,9 K], äîáàâëåí 26.06.2012

  • The role of constitutional principles in the mechanism of constitutional and legal regulation. Features of transformation in the interpretation principles. Relativism in the system of law. Local fundamental justice in the mechanism of the state.

    ðåôåðàò [24,7 K], äîáàâëåí 10.02.2015

  • Prerequisites of formation and legalization of absolutism. The social structure: documents; classes and ranks; state apparatus. The military and judicial reforms of Peter I. Development of the law during of absolute monarchy: decrees; civil, family law.

    êîíòðîëüíàÿ ðàáîòà [26,5 K], äîáàâëåí 14.08.2011

  • System of special legal supremacy of the Constitution guarantees the main source of law. The introduction and improvement of the process of constitutional review in the Dnestr Moldavian Republic. Interpretation of the provisions of the Constitution.

    ðåôåðàò [19,8 K], äîáàâëåí 14.02.2015

  • The article covers the issue of specific breaches of international law provisions owed to Ukraine by Russia. The article also examines problems in the application of international law by Russia. In the course of the Russian aggression against Ukraine.

    ñòàòüÿ [42,0 K], äîáàâëåí 19.09.2017

  • In the modern epoch within the framework of the civilized interaction of one of the most important elements of this process is the Islamic civilization and generated by it is Islamic law and state. Particularities of the Islamic concept of the state.

    ðåôåðàò [39,6 K], äîáàâëåí 10.02.2015

  • The official announcement of a state of emergency in the country. Legal measures that State Party may begin to reduce some of its obligations under the International Covenant on Civil and Political Rights. Ensure public order in emergency situations.

    ðåôåðàò [19,2 K], äîáàâëåí 08.10.2012

  • In world practice constitutional control is actually a develop institute with nearly bicentennial history. In this or that form it is presented and successfully functions in the majority of democratic states. Constitutionally legal liability in Russia.

    ðåôåðàò [51,3 K], äîáàâëåí 10.02.2015

Ðàáîòû â àðõèâàõ êðàñèâî îôîðìëåíû ñîãëàñíî òðåáîâàíèÿì ÂÓÇîâ è ñîäåðæàò ðèñóíêè, äèàãðàììû, ôîðìóëû è ò.ä.
PPT, PPTX è PDF-ôàéëû ïðåäñòàâëåíû òîëüêî â àðõèâàõ.
Ðåêîìåíäóåì ñêà÷àòü ðàáîòó.