Cyberattacks

The Prohibition of Cyberterrorism as a Method of Warfare in International Law: The Need for a New IHL Treaty

Abstract:

There is no doubt that cyber operations can play a significant role in the conduct of warfare. This article focuses on a specific aspect of cyber operations that is growing in significance: cyberterrorism as a method of warfare. It begins by exploring the definitional issues surrounding cyberterrorism. It then examines the extent to which international humanitarian law (IHL), which was primarily designed to govern kinetic means and methods of warfare, applies to cyberterrorism, and concludes that there is a need for new treaty law to explicitly prohibit such acts and to hold the perpetrators responsible.

Cyberwarfare: Threats, Security, Attacks, and Impact

Abstract: 

Cyberwarfare, an emerging topic within computer science, has the potential to disrupt power grids, cripple economies, and cause political unrest. This paper first discusses investigations into the different groups behind cyberwarfare activities, from nation states to individual hackers. This is followed by an overview of cyberwarfare attacks covering methods, targets, and impact. Next, the economic, socio-political, and infrastructure impacts from cyberwarfare are considered. The paper concludes with a discussion of ways to mitigate the damage from these types of attacks, the importance of learning from the attack methods, and suggestions to prevent future attacks.

South Korea’s Options in Responding to North Korean Cyberattacks

Abstract:

North Korea has increasingly mounted cyberattacks against South Korea. This paper first examines the dramatic differences between North and South Korea in cyberspace and the history of North Korean cyberattacks. Most of these attacks are easy to attribute for three reasons: they often come from addresses known to be used by North Korea; they often occur on Korean anniversaries; and they often use similar methods and attack code. In this article, the authors discuss possible responses by South Korea. Responses to these attacks begin with invoking  international  law  and  imposing  sanctions.  Next,  South  Korea  can  strengthen  its defences by improving coordination between the government and the private sector. Finally, South Korea could, justifiably, launch counterattacks.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com