Muutke küpsiste eelistusi

E-raamat: Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Apr-2020
  • Kirjastus: Cambridge University Press
  • Keel: eng
  • ISBN-13: 9781108846226
  • Formaat - EPUB+DRM
  • Hind: 123,50 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Apr-2020
  • Kirjastus: Cambridge University Press
  • Keel: eng
  • ISBN-13: 9781108846226

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"With the frequency of widely reported malicious cyber operations carried out by states steadily increasing, more and more policymakers and scholars have started deliberating how states should be allowed to, respond when their critical infrastructures orother legally protected interests fall victim to a significant cybersecurity incident triggered by an adversarial actor's conduct. Focusing on 'active cyber defences' such as 'hacking back' and other unilateral remedies, ranging from publicly calling outanother state for having engaged in malicious cyber conduct to imposing sanctions, the book closely examines three unilateral remedies found in customary international law that a targeted state may invoke in order to justify its response: self-defence, countermeasures, and necessity. Taking into account the pervasive problem of attributing cyber operations to the responsible actor in a reliable and above all timely manner, the study seeks to unfold the principal legal challenges that states face when applying rules of current international law to questions of transnational cybersecurity. The book concludes with some principled suggestions for future norm development for cyberspace"--

Arvustused

'The book is remarkable in several aspects: firstly, it does give several new impulses to discussions surrounding cyber operations. This especially holds true for the analysis of customary necessity. Secondly, the author focusses on those areas that are in fact of practical relevance and not merely of an academic nature. Attribution is the essential part in this respect, as is the focus on unilateral remedies, especially those below the level of armed force Lahmann's demonstrated broad and well-founded knowledge, not only in the cyber context but in general international law as a whole, gives the author's arguments considerable weight.' Johann-Christoph Woltag, ZaöRV/Heidelberg Journal of International Law

Muu info

A study of how states can lawfully react to malicious cyber conduct, taking into account the problem of timely attribution.
Preface ix
Acknowledgements xi
PART I CYBERSECURITY INCIDENTS AND INTERNATIONAL LAW
1(42)
1 The Spectre of Cyberwar
3(14)
2 Terminology
17(4)
3 International Legal Framework
21(22)
3.1 Cybersecurity Incidents and the Prohibition on the Use of Force
21(11)
3.2 Cybersecurity Incidents and the Principle of Non-intervention
32(6)
3.3 Cybersecurity Incidents and Violations of Sovereignty
38(3)
3.4 Conclusion
41(2)
PART II UNILATERAL REMEDIES TO CYBERSECURITY INCIDENTS
43(216)
4 Self-Defence
47(66)
4.1 Preconditions of Self-Defence
47(9)
4.2 Cybersecurity Incidents as Armed Attacks
56(8)
4.3 Preliminary Conclusion
64(1)
4.4 The Attribution Problem
65(44)
4.5 The Time Factor
109(3)
4.6 Conclusion
112(1)
5 Countermeasures
113(88)
5.1 Preconditions of Countermeasures
113(10)
5.2 Countermeasures as a Remedy for Cybersecurity Incidents
123(56)
5.3 Countermeasures for Other Purposes
179(21)
5.4 Conclusion
200(1)
6 Necessity
201(58)
6.1 Necessity in Customary International Law
204(3)
6.2 Preconditions of Necessity
207(22)
6.3 Necessity and the Question of the Use of Force
229(22)
6.4 Legal Consequences
251(4)
6.5 Conclusion
255(4)
PART III OUTLINES OF AN EMERGENCY REGIME FOR CYBERSPACE
259(26)
7 Transnational Cybersecurity, Unilateral Remedies, and the Rule of Law
261(6)
8 `Such Incidents Might Recur at Any Time': The Intervention Convention
267(5)
9 Possible Elements of the Cyber Emergency Regime
272(10)
9.1 Preconditions for Protective Conduct
272(2)
9.2 Ex Post Facto Assessment
274(5)
9.3 Accountability for Vulnerabilities Retention
279(3)
10 Concluding Remarks
282(3)
Bibliography 285(34)
Index 319
Henning Lahmann is a Senior Researcher at the Digital Society Institute in Berlin. In 2018, he received the Wolf Rüdiger Bub Award for his doctoral degree in international law at the University of Potsdam. He held research positions at universities in Kiel, Potsdam, and Berlin. In 2019, he was a fellow at the Israel Public Policy Institute researching disinformation campaigns.