| 研究生: |
司馬法 Naufal Bagus Pratama |
|---|---|
| 論文名稱: |
國際法下網路空間中的國家網路行動可課責性---Stuxnet案例 State Cyber Operations Accountability in Cyberspace under International Law: The Case of Stuxnet |
| 指導教授: |
陳貞如
Chen, Chen-Ju |
| 口試委員: |
張愷致
Chang, Kai-Chih 許耀明 Hsu, Yao-Ming |
| 學位類別: |
碩士
Master |
| 系所名稱: |
國際事務學院 - 國際研究英語碩士學位學程(IMPIS) International Master's Program in International Studies(IMPIS) |
| 論文出版年: | 2024 |
| 畢業學年度: | 112 |
| 語文別: | 英文 |
| 論文頁數: | 94 |
| 中文關鍵詞: | 網絡空間 、網絡攻擊 、網絡戰爭 、使用武力 、國家責任 、Stuxnet |
| 外文關鍵詞: | Cyberspace, Cyber Attack, Cyber Warfare, Use of Force, State Responsibility, Stuxnet |
| 相關次數: | 點閱:33 下載:10 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
網路空間被稱為所謂的「第五」戰爭領域,國家可以透過它進行敵對行動,故現已成為國際關係的重要舞台。儘管國家和法律專家都網路領域應該受到國際法約束,但由於缺乏專門規範國家網路行為的國際網路法,如何應用這些法律和規範仍然是一個挑戰。此外,透過網路空間進行的國家活動可以輕易匿名進行,並且很難追溯到任何特定的行為者。例如2010年Stuxnet事件,其展示了在網路環境中嘗試應用現行法律的難題。Stuxnet是一次前所未有的網路攻擊,導致了實際的物理破壞,襲擊並癱瘓了伊朗的核設施。Stuxnet被認為是首次將網路武器化,即網路戰爭時代的開端。然而,該事件並沒有被正式歸咎於任何一方,也沒有任何一方聲稱對此負責。目前,隨著地區緊張局勢的發展,類似Stuxnet的網路攻擊可能再次發生。因此,透過利用規範性法律研究和使用二手資料來回答研究問題,本論文將分析國家應如何根據現行國際法對其網路行動承擔責任,特別參考2010年Stuxnet惡意軟體攻擊事件。本研究認為,即使國際法適用於網路空間,但應用於網路領域時仍然存在挑戰,因此敦促國家保持一致的做法,並呼籲建立一部規範國家行為者在網路空間活動的國際條約。
Cyberspace is being referred to as the so-called "fifth" domain of war, enabling the conduct of hostilities through it and now is a key arena for international relations, including cyber warfare in conflicts among states. Although states and legal experts agree that international laws and norms apply to the cyber domain, yet with the absence of a cyber-specific international law that governs the State's operations within cyberspace, it is still a challenging task to apply it. Moreover, State activities conducted through cyberspace could easily be done anonymously and very hard to attribute to any particular actors. The Case of Stuxnet 2010 is a perfect example of the conundrum in terms of attempting the application of the prevailing laws to the cyber context. Stuxnet was an unprecedented cyber-attack that caused physical destruction, which hit and crippled Iranian nuclear facilities and is considered as the first utilization of cyber-weapon and referred to as the very dawn of the age of the cyber war. Yet, It was left officially unattributed, and no parties claimed responsibility. Currently, with the development of the tensions within the region, the possibility of “another” Stuxnet is present. Therefore, by utilizing normative legal research and the use of secondary data to answer the research question, this thesis will analyze how states should be held accountable for their cyber operations with the application of the existing international law, with special reference to the case of the Stuxnet malware attack 2010. The thesis concludes that, even though international law applies to the realm of cyberspace, it poses challenges in its application to the cyber realm and therefore urges consistent state practices and calls for an international treaty on the State’s operations in cyberspace to be established.
Acknowledgment iv
Abstract (Chinese) v
Abstract (English) vi
Table of Contents vii
Chapter 1: Introduction 1
1. Background 1
2. Research Purpose 5
3. Research Question 5
4. Research Methods 5
5. Thesis Scope and Limitation 7
6. Thesis Structure 8
Chapter 2: Terminologies and Concepts in Cyberspace 9
1. Cyberspace 10
2. Cyber Weapon 13
3. Cyber Attack 15
4. Cyber Operations & Warfare 17
5. State Responsibility 20
Chapter 3: Application of Current International Law(s) to Cyberspace 23
1. The UN Charter and Cyberspace 23
2. International Humanitarian Law and Cyberwarfare 30
3. ARSIWA (Articles on Responsibility of States for Internationally Wrongful Acts) 35
4. The Tallinn Manual(s) 40
Chapter 4: Case Study of Stuxnet and State Accountability for Cyber Operations 44
1. The Stuxnet: A Decade Young 44
2. Stuxnet as the Use of Force 46
3. Principle of Distinction & Proportionality of Stuxnet 51
4. Attributing Stuxnet 58
5. Stuxnet 2024? 70
Chapter 5: Conclusion & Recommendation 79
Bibliography 81
Additional Protocol I, 1977, The Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts
Adam Segal, 2014, "Axiom and the Deepening Divide in US – China Cyber Relations", Net Politics and Digital and Cyberspace Policy Program, Council on Foreign Relations, https://www.cfr.org/blog/axiom-and-deepening-divide-us-china-cyber-relations
Ademola Abass, 2011, Complete International Law, New York, Oxford University Press, p.240.
Advisory Service, 2004, What is International Humanitarian Law?, International Committee of Red Cross and Red Crescent (ICRC)
Al Jazeera Staff, 2024, Iran attacks Israel with over 300 drones, missiles: What you need to know, Al Jazeera, https://www.aljazeera.com/news/2024/4/14/iran-attacks-israel-with-over-300-drones-missiles-what-you-need-to-know, accessed on 22 May 2024
Andrew C. Foltz, 2012, "Stuxnet, “Schmitt Analysis,” And The Cyber “Use Of Force” Debate", Joint Force Quarterly, Issue 67, 4th Quarter
Andrew Luzzatto, 2022, "Regulating Cyber Warfare Through the United Nations", The Cyber Defense Review
Andy Greenberg, 2012, ‘What Stuxnet’s Exposure As An American Weapon Means For Cyberwar’, Forbes, https://www.forbes.com/sites/andygreenberg/2012/06/01/what-stuxnets-exposure-as-an-american-weapon-means-for-cyberwar/?sh=72f8879254c3, accessed on 20 May 2024
Annegret Bendiek and Matthias Schulze, 2021, "Attribution: A Major Challenge for EU Cyber Sanctions: An Analysis of WannaCry, NotPetya, Cloud Hopper, Bundestag Hack and the Attack on the OPCW", SWP Research Paper, No. 11, Stiftung Wissenschaft und Politik (SWP), Berlin
Anonymous, 2010, Debate Rages Over Iran's Nuclear Capability, Intentions, https://www.voanews.com/a/debate-rages-over-irans-nuclear-capability-intentions-91529714/116150.html, accessed on 19 May 2024
Anonymous, 2024, Iran’s President Ebrahim Raisi confirmed dead in helicopter crash, Aljazeera, https://www.aljazeera.com/news/2024/5/20/rescuers-say-no-sign-of-life-as-wrecked-helicopter-of-irans-raisi-found, accessed on May 20, 2024
Anonymous, 2024, Iran president and foreign minister killed in crash, BBC, https://www.bbc.com/news/articles/cpwwql21747o, accessed on May 20, 2024
Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, 2001
Author, 2011, Iran accuses Siemens over Stuxnet virus attack, Reuters, https://www.reuters.com/article/idUSTRE73G0NB/, accessed on 20 May 2024
Author, 2012, ‘Critical Analysis: Stuxnet Leaks: More than a Domestic Political Affair Denver Journal of International Law & Policy, https://djilp.org/critical-analysis-stuxnet-leaks-more-than-a-domestic-political-affair/, accessed on 20 May 2024
Brian M. Mazanec and Bradley A. Thayer, 2015, Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace, Palgrave Macmillan
Bruce Schneier, 2010, The Story Behind The Stuxnet Virus, Forbes, https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html?sh=869bdeb51e83, Accessed on 19 May 2024
Charter of the United Nations, 1945
Chen, T. & Abu-Nimeh, S, 2011, "Lessons from Stuxnet", Computer, Vol. 44, No. 4
Chimène I Keitner, 2019, 'Attribution by indictment', American Journal of International Law Unbound, Vol. 113
Christian Payne & Lorraine Finlay, 2017, "Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack", The Geo. Wash. Int’l L. Rev, Vol. 49
Compendium of statements in explanation of position on the final report, 2021, Document A/AC.290/2021/INF/2
Cordula Droege, 2012, "Get off my cloud: Cyber warfare, international humanitarian law, and the protection of civilians", International Review of the Red Cross, Vol. 94, No. 886
Corfu Channel, Merits, ICJ Reports, 1949, p. 4, at p. 23
Constantine Antonopoulos, 2015, “State Responsibility In Cyberspace”, Research Handbook On International Law And Cyberspace, Chapter 3, pages 55-71, Edward Elgar Publishing.
Cyberspace, Glossary, Tallinn Manual 2.0
Cyber Operations, Glossary, Tallinn Manual 2.0
Damien McGunniess, “How a Cyber-attack Transformed Estonia”, https://www.bbc.com/news/39655415, accessed on 3 May 2023
Daniel T. Kuehl, 2009, "CH 2: From Cyberspace to Cyberpower: Defining the Problem", Cyberpower and National Security, Potomac Books, Inc
Dan Williams, 2010, EXCLUSIVE-Cyber takes centre stage in Israel's war strategy, Reuters, https://web.archive.org/web/20101001091330/http://www.alertnet.org/thenews/newsdesk/LDE68R0GB.htm, accessed on 20 May 2024
Danae Azaria, 2020, ‘Codification by Interpretation’: The International Law Commission as an Interpreter of International Law, The European Journal of International Law, Vol. 31 no. 1
David E. Graham, 2010, “Cyber Threats and the Law of War”, Journal Of National Security Law & Policy, Vol. 4, No. 87
David E. Singer, 2012, "Obama Order Sped Up Wave of Cyberattacks Against Iran", The New York Times, https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html, accessed on 8 May 2024
David Graham, 2010, ‘Cyber Threats and the Law of War’, Journal of National Security Law and Policy, Vol. 87, No. 91
David Kushner, 2024 ‘The Real Story of Stuxnet’, IEEE Spectrum, https://spectrum.ieee.org/the-real-story-of-stuxnet, accessed on 20 May 2024
Dawan Mohammed Jaza, 2019, "The Nature of International Responsibility of States in the Contemporary World Arena", Journal of University of Human Development (JUHD), Vol. 5, No. 4
Declaration on the Inadmissibility of Intervention into the Domestic Affairs of States and the Protection of Their Independence and Sovereignty, 1965, U.N. GA Res 2131(XX)
Dr Jakob Kellenberger, 2012, “International Humanitarian Law and New Weapon Technologies: 34th Round Table on current issues of international humanitarian law”, International Review of the Red Cross, Vol. 94, No. 886
Duncan Hollis, 2007, ‘Why States Need an International Law for Information Operations’, Lewis & Clark Law Review, Vol. 11, No. 4
Elinor Mills, 2010, “Stuxnet: Fact vs. theory”, CNET, https://www.cnet.com/news/privacy/stuxnet-fact-vs-theory/, accessed on 19 May 2024
Eric Talbot Jensen, 2017, "The Tallinn Manual 2.0: Highlights And Insights", Georgetown Journal Of International Law
Eugenio Lilli, 2021, "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence", Contemporary Security Policy, Vol. 42, No. 2
Evan Andrews, “Who Invented the Internet?”, https://www.history.com/news/who-invented-the-internet, accessed on 20 October 2023
Final Report, 2015, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Document A/70/174
Final Substantive Report, 2021, Open-ended working group on developments in the field of information and telecommunications in the context of international security, Document A/AC.290/2021/CRP.2
Flashpoint Intel Team, 2024, "Amid Escalating Iran-Israel Conflict, Understanding the Hybrid Nature of Cyber Threats", https://flashpoint.io/blog/iran-israel-conflict-cyber-threats/, accessed on 22 May 2024
François Delerue, 2020, Cyber Operations and International Law, "State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation", Cambridge University Press, p. 381-421.
Gabcikovo-Nagymaros Project (Hungary/Slovakia), ICJ Reports, 1997, p. 7. At p. 38, para. 47
Gaby Portnoy, 2024, "Head of the Israel National Cyber Directorate Gaby Portnoy at the Cybertech Conference: The intensity of cyber attacks has increased threefold during the war", Israel National Cyber Directorate, https://www.gov.il/en/pages/cyber_tech_2024, accessed on 22 May 2024
General Assembly Resolution, 1990, U.N. Doc. A/RES/45/121
General Assembly Resolution, 2001, Responsibility of States for Internationally Wrongful Act, A/RES/56/83
General Assembly Resolution, 2001, U.N. Doc. A/RES/55/63
General Assembly Secretary-General, 2022, Report on Responsibility of States for internationally wrongful acts Compilation of decisions of international courts, tribunals and other bodies, A/77/74
General Commentary, 2001, Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries
Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 1949
Gregory Gromov, 2012, “History of Internet and World Wide Web - Roads and Crossroads of the Internet History”, http://www.netvalley.com/, accessed on 20 October 2023
Hancock, Beverly, 2002, An Introduction to Qualitative Research, Leicester, Trent Focus Group
Heather Harrison Dinniss, 2012, Cyber Warfare and the Laws of War, Cambridge University Press
Herbert S. Lin, 2010, Offensive Cyber Operations and the Use of Force, National Security Law & Policy, Vol. 4, No. 1
Hugo Grotius, 1965, De Jure Belli Ac Pacis
John Markoff, “Before the Gunfire, cyberattacks”, https://www.nytimes.com/2008/08/13/technology/13cyber.html, accessed on 3 May 2023
ICJ, 1949, The Corfu Channel Case (UK v. Albania)
ICJ, 1986, Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.)
ICJ, 1996, Advisory Opinion, Legality of the Threat or Use of Nuclear Weapons
ICJ, 2007, Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), Merits.
ICRC Position Paper, 2020, “International humanitarian law and cyber operations during armed conflicts”, International Review of the Red Cross, Vol. 102, No. 913
ICRC, 2004, "What is International Humanitarian Law?", Advisory Service on International Humanitarian Law
ICTY, 2000, Judgement, The Prosecutor v.Kupreškić et al.
Ido Kilovaty, 2014, "Cyber Warfare and the jus Ad Bellum Challenges: Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare", American University National Security Law Brief, Vol. 5, Issue 1
International Criminal Tribunal for the Former Yugoslavia, 1999, Prosecutor v. Tadić, Case No. IT-94–1-A, Judgment, para. 120
International Law Commision, 1970, Yearbook of the International Law Commission, Volume II
International Law Commission, Historical Antecedents, https://legal.un.org/ilc/ilcintro.shtml
J. Crawford, 2002, The International Law Commission's Articles on State Responsibility: Introduction, Text, and Commentaries, Cambridge University Press, p. 140.
Jakub Vostoupal, 2024, “Stuxnet vs WannaCry and Albania: Cyber-Attribution on Trial”, available at SSRN: https://ssrn.com/abstract=4729496
James P. Farwell and Rafal Rohozinski, 2011, “Stuxnet and the Future of Cyber War”, Survival, Vol. 53. No.1
Jarno Limnéll, Thomas Rid, 2014, “Is Cyberwar Real? Gauging the Threats”, Foreign Affairs, Vol. 93, No. 2, p. 166-168.
Jason Barkham, 2002, Information Warfare And International Law On The Use Of Force, International Law And Politics, Vol. 34, No. 57
Jean S. Pictet, 1952, Commentary On The Geneva Convention For The Amelioration Of The Condition Of The Wounded And Sick In Armed Forces In The Field
Jeremy Richmond, 2012, "Evolving Battlefields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict," Fordham International Law Journal, Vol.35, No. 3, 842-894.
Jeremy Wright, 2018, "The UK Attorney General, Speech Delivered at Chatham House, London: Cyber and International Law in the 21st Century", Attorney General's Office, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century, accessed on 6 March 2024
JN Sakellariadis, 2022, Extending the ‘Attribution Problem’: Why Who-Based Attribution Is Insufficient to Deterring Cyberattacks, Journal of Information Warfare
Joby Warrick, 2011, Iran Touts Major Advances in Nuclear Program, The Washington Post, https://www.washingtonpost.com/world/iran-touts-major-advances-in-nuclear program/2011/04/11/AFZ8cxMD_story.html, accessed on 19 May 2024
John Arquilla, 2013, ‘Twenty Years of Cyberwar’, Journal of Military Ethics
John P Carlin, 2016, ‘Detect, disrupt, deter: A whole government approach to national security cyber threats’, Harvard National Security Journal, Vol. 7
John Richardson, 2011, “Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield”, Journal Of Computer & Information Law, Vol. 29, No. 1
John Richardson, 2011, Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield, John Marshall Journal of Computer and Information Law, Vol. 29(1), 1-28.
Joint Publication 1-02, 2017, Department of Defense Dictionary of Military and Associated Terms
Jon Gambrell, 2024, "Iran’s supreme leader tacitly acknowledges that Tehran hit little in its attack on Israel", AP, https://apnews.com/article/iran-israel-khamenei-mideast-66280e717d335afffd9e258a5985d50c, accessed on 22 May 2024
Jon Gambrell, 2024, Iran’s President, Foreign Minister And Others Found Dead At Helicopter Crash Site, State Media Says, APNews, https://apnews.com/article/iran-president-ebrahim-raisi-426c6f4ae2dd1f0801c73875bb696f48, accessed on May 20, 2024
Josh Fruhlinger, 2022, ‘Stuxnet Explained: The First Known Cyberweapon’, CSO, https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html, accessed on 20 May 2024
Jutta Brunnée, 2005, “International Legal Accountability Through the Lens of the Law of State Responsibility”, Netherlands Yearbook of International Law, Vol. 36
Karine Bannelier and Théodore Christakis, 2017, Cyber-Attacks. Prevention-Reactions: The Role of States and Private Actors, Les Cahires de la Revue Défense Nationale
Keir Giles and Kim Hartmann, 2019, “Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict’, 11th International Conference on Cyber Conflict: Silent Battle, NATO CCD COE Publications, Tallinn
Kim Zetter, 2014, ‘An Unprecedented Look at Stuxnet, the World’s First Digital Weapon’, Wired, https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/, accessed on 20 May 2024
Kim Zetter, 2014, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, Crown Publishers
Kristen E Eichensehr, 2017, ‘Three Questions on the WannaCry Attribution to North Korea’, Just Security, https://www.justsecurity.org/49889/questions-wannacry-attribution-north-korea/, accessed on 22 May 2024
Kristen E Eichensehr, 2020, ‘The Law and Politics of Cyberattack Attribution’, UCLA Law Review, Vol. 520, No. 582.
Kristen Eichensehr,2014, "Review of The Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013)", American Journal of International Law, Vol 108
Kubo Mačák, 2016, "Is the International Law of Cyber Security in Crisis?", 8th International Conference on Cyber Conflict, NATO CCD COE Publications
Lianne J.M. Boer, 2019, "Lex lata comes with a date; or, what follows from referring to the “Tallinn Rules.” AJIL Unbound, Vol. 113
Lorraine Finlay and Christian Payne, 2019 ‘The attribution problem and cyber armed attacks’, American Journal of International Law
Luis Acosta, 2015, Legal Effect of United Nations Resolutions Under International and Domestic Law, The Law Library of Congress, Global Legal Research Directorate
Major Aaron D. Kirk, 2019, “Artificial Intelligence And The Fifth Domain”, Air Force Law Review, 183-236
Marco De Falco, 2012, "Stuxnet Facts Report: A Technical and Strategic Analysis", NATO Cooperative Cyber Defence Centre of Excellence, Tallinn.
Marco Roscini, 2015, Cyber Operations as a Use of Force
Marco Sassòli, et all, 2011, How Does Law Protect In War?, Chapter 9: Conduct of Hostilities, Means and Methods of Warfare, ICRC
Martin Dixon, 2013, Textbook on International Law, United Kingdom, Oxford University Press, p. 252.
Matthew C. Waxman, 2011, "Cyber Attacks as "Force" Under UN Charter Article 2(4)", Faculty Publications, Columbia Law School
Matthew J. Sklerov, 2009, Solving The Dilemma Of State Responses To Cyberattacks: A Justification For The Use Of Active Defenses Against States Who Neglect Their Duty To Prevent, 57th Judge Advocate Officer Graduate Course
Marko Divac Öberg, 2006, "The Legal Effects of Resolutions of the UN Security Council and General Assembly in the Jurisprudence of the ICJ", The European Journal of International Law, Vol. 16, No.5
McConville, Mike and Wing Hong Chui, 2012, Research Methods for Law, Edinburgh, Edinburgh, University Press
Michael G. Vickers & Robert C. Martinage, 2004, The Revolution in War, Center for Strategic and Budgetary Assessments, Washington DC
Michael J Glennon, 2013, ‘The dark future of international cybersecurity regulation’, Journal of National Security Law & Policy, Vol. 6
Michael N. Schmitt, 2003, “The Sixteenth Waldemar A. Solf Lecture in International Law,” Military Law Review, Vol. 176
Michael N. Schmitt, 2012, "International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed", Harvard International Law Journal Online, Vol. 54
Michael N. Schmitt, 2013, Tallinn Manual on The International Law Applicable to Cyber Warfare, Cambridge University Press
Michael N. Schmitt, 2015, "The Law of Cyber Targeting", NATO CCD COE, Tallinn Paper No. 7
Michael N. Schmitt, 2017, Tallinn Manual 2.0 On The International Law Applicable To Cyber Operations, Cambridge University Press
Michael N. Schmitt, 2017, "Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t", Just Security, https://www.justsecurity.org/37559/tallinn-manual-2-0-international-law-cyber-operations/
Michael N. Schmitt; Sean Watts, 2015, "The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare," Texas International Law Journal, Vol. 50, No. 2-3
Michael Robinson, Kevin Jones, and Helge Janicke, 2014, "Cyber warfare: Issues and challenges", Computers & Security, Vol. 49
Michael Schmitt, 1999 ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’, Columbia Journal of Transnational Law, Vol. 37, 1998-99
Mitchell Stapleton-Coory, 2019, The Enduring Legacy Of The Martens Clause: Resolving The Conflict Of Morality In International Humanitarian Law, Adelaide Law Review, Vol. 40, No. 2
Nicholas Tsagourias and Michael Farrell, 2020, ‘Cyber attribution: Legal and technical approaches and challenges’, European Journal of International Law, Vol. 31, No. 3
Nicolas Falliere, Liam O Murchu, and Eric Chien, 2011, “W32.Stuxnet Dossier”, Symantec Security Response
Oliver Kessler And Wouter Werner, 2013, Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare, Leiden Journal of International Law, Vol. 26
Oona A. Hathaway and others, 2012, "The Law of Cyber-Attack", California Law Review, Vol. 100
Oscar Schachter, 1984, "The Right of States to Use Armed Force", Michigan Law Review, Vol. 82, Issue 5
Parisa Hafezi and Yomna Mohamed, 2024, Iranian President Ebrahim Raisi killed in Helicopter Crash, Reuters, https://www.reuters.com/world/middle-east/hopes-fade-wreckage-found-helicopter-carrying-iranian-president-raisi-2024-05-20/, accessed on 20 May, 2024:
Paul B. Stares & General John W. Vessey, 2024, “Preventive Priorities Survey”, Center for Preventive Action
Phosphates in Morocco, Preliminary Objections, 1938, P>C.I.J., Series A/B, No. 74, p.10.
Preventive Priorities Survey, 2024, “Conflicts to Watch in 2024”, Council on Foreign Relations, https://www.cfr.org/report/conflicts-watch-2024, accessed on 22 May 2024
Prosecutor v. Tadic, 1995, Case No. IT-94-1, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, Para. 70
Rain Liivoja. 2015, “Technological Change and the Evolution of the Law of War”, International Review of the Red Cross, Vol. 97, No. 900
Richard A. Clarke & Robert K. Knake, 2010, Cyber War: The Next Threat To National Security And What To Do About It, HarperCollins Publishers
Rain Ottis, 2018, "Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective", Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
Report of the Secretary-General, 2017, Responsibility of States for internationally wrongful acts, Compilation of decisions of international courts, tribunals and other bodies, A/71/80/Add.1
Richard J. Harknett & Max Smeets,2 020, "Cyber Campaigns and Strategic Outcomes", Journal of Strategic Studies
Rishi Iyengar, 2024, "The Next Israel-Iran Fight Could Be in Cyberspace", Foreign Policy, https://foreignpolicy.com/2024/04/16/iran-israel-conflict-missile-attack-cyberattacks-warfare/, accessed on 22 May 2024
Robert Rosenstock, 2002,”The ILC and State Responsibility”, The American Journal of International Law, Vol. 96, No. 4, p. 792-797.
Rohit Bokil, 2023, Cyber Warfare: Taking War to Cyberspace and its Implications for International Humanitarian Law, International Journal for Multidisciplinary Research, Volume 5, Issue 1
Rupert Ticehurst, 1997, The Martens Clause and the Laws of Armed Conflict, International Review of the Red Cross, No. 317
Ryan Jenkins, 2013, Is Stuxnet Physical? Does It Matter?, Journal of Military Ethics, Vol. 12, No.1
Samuli Haataja and Afshin Akhtar-Khavari, 2018, “Stuxnet And International Law On The Use Of Force: An Informational Approach”, Cambridge International Law Journal
Sean Seddon and Daniele Palumbo, 2024, "What we know about Israel's missile attack on Iran", BBC, https://www.bbc.com/news/world-middle-east-68853402, accessed on 22 May 2024
Shaan Shaikh, 2024,”The Iran-Israel Air Conflict, One Week In”, Center for Strategic & International Studies, https://www.csis.org/analysis/iran-israel-air-conflict-one-week, accessed on 22 May 2024
Shan Ali and Sabira Naz Qureshi, 2022, Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict, Journal of Development and Social Sciences, Vol. 3, No. 2
Sharon Wrobel, 2024, "Cyberattacks by Iran, Hezbollah have tripled during the war, says Israel cyber czar" The Times of Israel, https://www.timesofisrael.com/cyberattacks-by-iran-hezbollah-have-tripled-during-the-war-says-israel-cyber-czar/, accessed on 22 May 2024
Statute of the International Law Commission, 1947
Stephen M. Schwebel, 1979, "The Effect of Resolutions of the U.N. General Assembly on Customary International Law," Proceedings of the Annual Meeting (American Society of International Law), Vol. 73
Sean Collins & Stephen McCombie, 2012, “Stuxnet: the emergence of a new cyber weapon and its implications”, Journal of Policing, Intelligence and Counter Terrorism, 7:1, 80-91.
Vaibhav Sharma, 2019, “Can Existing International Law Regulations and Cyber Operations Meet at a Junction?”, Journal of Emerging Technologies and Innovative Research, Vol. 6
Statista, “Numbers of Internet Users Worldwide”, https://www.statista.com/study/12322/global-internet-usage-statista-dossier/ accessed on 9 January 2023
Stefano Mele, 2014, “Legal Considerations on Cyber-Weapons and Their Definition”, Journal of Law & Cyber Warfare, Vol. 3, No. 1
Tainyi Luor and others, 2023, "Trends in and Contributions to Tallinn Manual Research: An Assessment of the Literature from 1998 to November 2022", Informatica Economică, Vol. 27, No. 3
Ted Regencia, 2024, Iran Helicopter Crash Updates: President Raisi, FM Amirabdollahian Die, Aljazeera, https://www.aljazeera.com/news/liveblog/2024/5/19/iran-helicopter-accident-live-president-fm-on-missing-aircraft, accessed on May 20, 2024
Thomas Rid & Peter McBurney, 2012, Cyber-Weapons, The RUSI Journal, Vol. 157, No. 1
The Budapest Convention on Cybercrime 2001
The Factory at Chorzów (Claim for Indemnity) (Germany v. Poland) [1928] PCIJ Ser A No 17, 29
The Joint Chiefs of Staff (JCS), 2018, Joint Publication 3-12 Cyberspace Operations
The North Atlantic Council, North Atlantic Treaty Organization, 2014, “Wales Summit Declaration”, Press Release, https://www.nato.int/cps/en/natohq/official_texts_112964.htm
The North Atlantic Treaty, 1949
The White House, 2009, ‘Remarks by the President on Securing our Nation’s Cyber infrastructure’, Office of the Press Secretary, https://obamawhitehouse.archives.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure , accessed on 19 May 2024
The White House, 2011, International Strategy for Cyberspace, National Archives, Washington D.C., https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Thomas M. Franck, 2004, Recourse To Force: State Action Against Threats And Armed Attacks, Cambridge University Press
Tian Shaohui, 2017, “China’s International Strategy of Cooperation on Cyberspace”, available at http://www.xinhuanet.com/english/china/2017-03/01/c_136094371.htm
Tom Gjelten, 2012, ‘Cyber Insecurity: U.S. Struggles to Confront Threat’, NPR.org, http://www.npr.org/templates/story/story.php?storyId=125578576
US Department of Defense, 2006, The National Military Strategy for Cyberspace Operations.
William Gibson, 1984, Neuromancer
UN GA Resolution, 2015, Developments in the field of information and telecommunications in the context of international security, Document A/RES/70/237
UN GA Resolution, 2018, Developments in the field of information and telecommunications in the context of international security, Document A/RES/73/27
U.N. Security Council Resolutions 1737 (2006)
U.N. Security Council Resolutions 1747 (2007)
U.N. Security Council Resolutions 1803 (2008)
U.N. Security Council Resolutions 1929 (2010).
UK Cabinet Office, 2022, "Government Cyber Security Strategy: 2022 to 2030", available at https://www.gov.uk/government/publications/government-cyber-security-strategy-2022-to-2030
UN General Assembly Resolution, 2003. Developments in the field of information and telecommunications in the context of international security, Document A/RES/58/32
Vincent Bernard, 2014, "Delineating The Boundaries Of Violence", International Review of the Red Cross, Vol. 96, No. 893
William C Banks, 2019, ‘The bumpy road to a meaningful international law of cyber attribution’, American Journal of International Law Unbound, Vol. 113
William J Broad, John Markoff and David E Sanger, 2010, ‘Israeli Test on Worm Called Crucial in Iran Nuclear Delay’, The New York Times, https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html, accessed on 20 May 2024
Yoram Dinstein, 2011, War, Aggression and Self-Defence (5th Ed), Cambridge University Press
Zen Chang, 2017, "Cyberwarfare and international humanitarian law", Creighton International and Comparative Law Journal, Vol.9, No. 1