Cyber Operations and International Law /
Francois Delerue
- 1st Ed.
- Cambridge, United Kingdom Cambridge University Press 2020
- xxii, 513p. : ill. ; 23cm
- Cambridge Studies in International and Comparative Law .
It includes List of Abbreviations, Contents, Conclusions, Appendix, Selected Bibliography and Index Pages etc..
Book description:
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.
Table of Contents:
Cyber Operations and International Law pp i-i Get access Export citation
Select Cambridge Studies in International and Comparative Law: 146 - Series page
Cambridge Studies in International and Comparative Law: 146 - Series page pp ii-ii Get access Export citation
Select Cyber Operations and International Law - Title page
Cyber Operations and International Law - Title page pp iii-iii Get access Export citation
Select Copyright page
Copyright page pp iv-iv Get access Export citation
Select Contents
Contents pp v-xviii Get access Export citation
Select Abbreviations
Abbreviations pp xix-xxii Get access Export citation
Select 1 - Does International Law Matter in Cyberspace?
1 - Does International Law Matter in Cyberspace? pp 1-50 Get access Export citation
Select Part I - Attribution
Part I - Attribution pp 51-190 Get access Export citation
Select 2 - Attribution to a Machine or a Human: A Technical Process
2 - Attribution to a Machine or a Human: A Technical Process pp 55-86 Get access Export citation
Select 3 - The Question of Evidence: From Technical to Legal Attribution
3 - The Question of Evidence: From Technical to Legal Attribution pp 87-110 Get access Export citation
Select 4 - Attribution to a State
4 - Attribution to a State pp 111-188 Get access Export citation
Select Part I – Conclusion
Part I – Conclusion pp 189-190 Get access Export citation
Select Part II - The Lawfulness of Cyber Operations
Part II - The Lawfulness of Cyber Operations pp 191-378 Get access Export citation
Select 5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law
5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law pp 193-272 Get access Export citation
Select 6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack
6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack pp 273-342 Get access Export citation
Select 7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations
7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations pp 343-352 Get access Export citation
Select 8 - Cyber Operations and the Principle of Due Diligence
8 - Cyber Operations and the Principle of Due Diligence pp 353-376 Get access Export citation
Select Part II – Conclusion
Part II – Conclusion pp 377-378 Get access Export citation
Select Part III - Remedies against State-Sponsored Cyber Operations
Part III - Remedies against State-Sponsored Cyber Operations pp 379-492 Get access Export citation
Select 9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation
9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation pp 381-422 Get access Export citation
Select 10 - Measures of Self-Help against State-Sponsored Cyber Operations
10 - Measures of Self-Help against State-Sponsored Cyber Operations pp 423-490 Get access Export citation
Select Part III – Conclusion
Part III – Conclusion pp 491-492 Get access Export citation
Select 11 - Conclusion
11 - Conclusion pp 493-498 Get access Export citation
Select Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses
Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses pp 499-501 Get access Export citation
Select Select Bibliography
Select Bibliography pp 502-508 Get access Export citation
Select Index
Index pp 509-513 Get access Export citation
Select Cambridge Studies in International and Comparative Law - Series page
Cambridge Studies in International and Comparative Law - Series page pp 514-522
9781108748353
Cyberspace operations (Military science); Aggression (International law); International law; Cyberspace operations (International law); Cyberterrorism--Law and legislation