Update 30th September 2024: Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more
Chapter 17 attempts to pin down a moving target, cyber and its use and utility in armed conflict. The cyber targets chosen by China, Russia, Iran, and North Korea are detailed. The chapter defines cyber “attacks,” differentiating them from cyber “operations” – akin to a felony-misdemeanor distinction. Cyberattacks are found to be a use of armed force, in the sense of UN Charter Article 2(4), raising the right of victim states to respond with armed force in self-defense. Potential cyber conflicts are classified as international or non-international based upon their perpetrators. The difficulties of attribution of cyberattacks are detailed, including sovereignty and military necessity. A counter to cyberattack is belligerent reprisal, which is explored. Cyberattacks on critical national infrastructure (CNI) are a major problem. After defining CNI, the US position on responses is discussed. Recent changes in US cyber policy authorize far greater cyber retaliation and reprisal, as well as providing federal funding to carry them out. Finally, CNI’s weak link, the unwillingness of civilian corporations to fund their own cyber protection, is noted.
Review the options below to login to check your access.
Log in with your Cambridge Higher Education account to check access.
If you believe you should have access to this content, please contact your institutional librarian or consult our FAQ page for further information about accessing our content.