Normal view MARC view ISBD view

Cyber Warfare and International Humanitarian Law / Aruna Kammila

By: Kammila, Aruna.
Material type: TextTextPublisher: Allahabad Central Law Publications 2020Edition: 1st Ed. Reprinted 2022.Description: xvi, 196p. : ill. ; 23cm.ISBN: 9788194808008.Subject(s): War (International law); Cyberterrorism; Information warfare (International law)DDC classification: 343.0999 KAM Online resources: Click here to access online
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Notes Date due Barcode
 Text Book Text Book VIT AP School of Law
LAW Section
343.0999 KAM (Browse shelf) LA01911 In transit from VIT AP School of Law to VIT-AP since 2023-11-28 LAW 020763

It includes Foreword, Preface, Acknowledgements, Contents, Introduction, Chapters, Conclusions and Suggestions and Bibliography pages etc.

Characterization:
Contents

CHAPTER I

INTRODUCTION



CHAPTER II

WARFARE-TECHNOLOGY-INTERFACE

2.1. Evolution of Warfare

2.1.1. First Generation Warfare

2.1.2. Second Generation Warfare

2.1.3. Third Generation Warfare

2.1.4. Fourth Generation Warfare

2.1.4.1. Changing actors on the battlefield

2.1.4.2. The Emergence of Cyber Warfare as the

Fourth Generation Warfare

2.1.4.3. The ambiguity of line between war,

peacetime and unidentified victory conditions

2.2. Law of War

2.2.1. The History of International Humanitarian Law

2.3. History of the Internet

2.4. Today’s Internet

2.5. Actors in Cyberspace

2.5.1. Netizens

2.5.2. Script kiddies

2.5.3. Hackers

(a) The white hat hackers

(b) The black hat hackers

(c) The grey hat hackers

2.5.4. Hacktivists

2.5.5. Patriot hackers

2.5.6. Cyber Insiders

2.5.7. Cyber Terrorists

2.5.8. Malware authors

2.5.9. Cyber Scammers

2.5.10. Organized Cybercriminals

2.5.11. Corporations

2.5.12. Cyber espionage agents

2.5.13. Cybermilitia

2.6. Arsenal of Cyber Warrior

2.7. The Nexus Between Cyber Warfare and International

Humanitarian Law

CHAPTER 3

CYBER WARFARE-CONCEPTUAL ANALYSIS

3.1. Analysis Of Different Cyber Terminologies In Cognition of the Concept

3.1.1. Cyberspace

3.1.2. Cyber Operations

3.1.3. Information Warfare

3.1.4. Cyber War

3.1.5. Cyber Warfare

3.1.6. Cyber-Crime

3.1.6.1. Hacking

3.1.6.2. Computer Viruses

3.1.6.3. Phishing

3.1.6.4. Spoofing

3.1.6.5. Phone Phishing

3.1.6.6. Internet Pharming

3.1.6.7. Publishing Pornographic Material In Electronic Form

3.1.6.8. Investment Newsletter

3.1.6.9. Credit Card Fraud

3.1.7. Cyber-attack

3.1.7.1. Shanghai Cooperation Organisation

3.1.7.2. Council of Europe's Convention on Cybercrime

3.1.7.3. US Army's DCSIN7 Handbook No. 1.02

3.1.7.4. Definition by M. Rossini

3.1.7.5. Definition in Tallinn Manual

3.1.7.6. Definition bv Oona Hathaway

3.1.7.7. The Recommended Definition

(a) Intent

(b) Motive

(c) Actors

(d) Means and methods

(e) Target

(f) Effects

3.2. The Comparison of Cyber-Attack, Cyber-Crime, and Cyber-Warfare

3.3. Cyber Operations and Incidents

3.3.1. Cyber-attack by the United States America

3.3.2. Russia and Chechnya

3.3.3. Kosovo and the U.S.A

3.3.4. Israel and Palestine

3.3.5. Estonia and Russia

3.3.6. Israel and Syria

3.3.7. Lithuania

3.3.8. Russia and Georgia

3.3.9. Russia and Kyrgystan

3.3.10. South Korea and the U.S.A

3.3.11. Iran

3.3.12. Myanmar

3.3.13. Operation Israel (Oplsrael)

3.3.14. Singapore

3.3.15. Operation Shady Rat

3.3.16. Red October malware

3.3.17. Wanna cry Ransomware attack

3.3.18. Attack on Yahoo



CHAPTER 4

USE OF FORCE AND CYBER ATTACKS

4.1. Principles or Norms to be followed during the Use of Force .

4.1.1. Jus in Bello

4.1.2. Jus ad Bellum

4.2. Prohibition on the use of force

4.2.1. Interpretation and the Scope of Article 2(4)

4.2.2. Crossing the threshold of use of force

4.2.3. Application by Analogy?

4.2.4. Leading Approaches

4.2.4.1. Instrument-Based Approach

4.2.4.2. Target-Based Approach

4.2.4.3. Effects-Based Approach

4.2.4.4. Normative Framework by Schmitt

4.2.4.5. Cyber-Physical Systems-Based Approach

4.2.4.6. The Approach by Noah Simmons

4.2.4.7. Tallinn Manual Approach

4.2.4.8. International Committee of Red Cross

4.2.4.9. Other Approaches

4.3. An Expedition through the Present to the Future


CHAPTER 5

USE OF FORCE - EXCEPTIONS

5.1. Technological Concerns with Cyber Crimes

5.1.1. Intrusion

5.1.2. Denial of Service

5.2. Effects of Cyber Attack on Victims vis-a-vis Right of

Self Defence

5.2.1. Revenge on Estonia

5.2.2. Stuxnet the Game Changer

5.2.3. The Moonlight Maze

5.2.4. Lockheed Martin’s

5.2.5. Compromise with US Military Security

5.3. Issues with Exercise of Right of Self Defence

5.3.1. Cyber Attack As An Armed Attack

5.3.1.1. Attribution

5.3.1.2. Jurisdiction

5.3.2. Use of Force in Self Defence

5.3.2.1. Necessity

5.3.2.2. Proportionality

5.3.2.3. Immediacy

5.3.2.4. Imminence

5.4. Anticipatory Self-defence/Pre-emptive/Preventive defence

5.5. Neutrality

5.6. Distinction

5.7. Counter Measures Other Than Use Of Force

5.8. Self-defence Vis A Vis Tallinn Manual

5.9. Other Legal Framework

5.9.1. Jus in Bello

5.9.2. Countermeasures

5.10. Legal Regimes That Directly Deal With Cyber Attacks

5.10.1. United Nations

5.10.2. North Atlantic Treaty Organisation

5.10.3. The Council of Europe

5.10.3. The Organisation of American States

5.10.4. Shanghai Cooperation Organisation

5.11. Legal Regimes That Deal Indirectly With Cyber Attacks

5.11.1. Law of Space

5.11.2. Law of seas

5.11.3. Telecommunications Law

5.11.4. Aviation Law

5.11.5. Treaty Law



CHAPTER 6

CYBER SECURITY POLICIES AND CYBER WARFARE - A CRITICAL ANALYSIS

6.1. Cyber Security: Indian Perspective

6.1.1. Cyber Security Policy-Need of the hour

6.1.2. Cyber Security Policy of India, 2013 & Countermeasure Framework

6.2. Cyber Warfare and Security- The Russian Perspective

6.2.1. Agencies and Organizations

6.2.2. Role of Hackers and Criminals in Russian Cyber Space Regime

6.2.3. Cyber uses in the generation of Kinetic Effects- Current Regime

6.2.4. The Cyber role in the Russian Propaganda

6.3. Cyber Security Policy: The United States Perspective

6.3.1. Strategic National Cyber Security Objective

6.3.2. Protecting Critical Infrastructure

6.4. Cyber Security Policy: The Chinese Perspective

6.4.1. Cyber Security Law of People’s Republic of China

6.4.1.1. Data Localization

6.4.1.2. Handling of Personal Information

6.4.1.3. Transfer of Personal Information

6.4.1.4. Identity Verification of Internet Users and

Protection of Minors

6.4.1.5. Draft Measures to expand Data Localization

and Cross-Border Transfer Requirements

6.5. Cyber Deterrence

6.5.1. Principles of Cyber Deterrence

6.5.1.1. Deterrence by Punishment

6.5.1.1.1. Conditions of successful Deterrence by Punishment

6.5.1.1.1.1. The credibility of the threat

6.5.1.1.1.2. Capability to display and use of force

6.5.1.1.1.3. Communication of the threat

6.5.1.2. Deterrence by Denial

6.5.2. Challenges to implement deterrence in cyberspace

6.5.2.1. Anonymity

6.5.2.2. Asymmetry

6.5.2.3. Super-Empowerment

6.5.2.4. Temporality

6.5.2.5. Scalability

6.5.3. Applying the existing law on armed conflict to cyber-warfare

6.5.4. Recommendations for successful implementation of the theory of deterrence

in cyberspace



CHAPTER 7

CONCLUSION AND SUGGESTIONS

There are no comments for this item.

Log in to your account to post a comment.

Visitor Number:

Powered by Koha