On Cyber Threats and Information Warfare
The need for a treaty in cyberspace
Comparing cyber weapons and weapons of mass destruction, as some Rus- sian analysts have done, is quite drastic. If a country that believes itself to be under the threat of a cyber attack were to resort to a deterrence strategy, this would lead to a dangerous escalation of the situation, especially bear- ing in mind that it is very easy to conceal digital traces and mislead adver- saries in cyberspace. Such a development could, in a short period of time, lead to an unpleasant situation that would be hard to control or manage, with more or less uninten- tional escalations. In view of the cyber attacks against Estonia in 2007 and Georgia in 2008, there is a growing concern that different kinds of activists could and would carry out large-scale and co-ordinated cyber operations against vital targets. A number of questions have to be answered: Is the response to a potential cyber operation a task for law enforcement agencies, or a matter for the military or some other organisation?308 Should it be carried out and resolved on national level or internationally? And with what means? According to UN Article 51 every nation has the right to protect itself against armed attacks. Is this the case in cyberspace, too? How should phenomena such as cyber terrorism, cyber crime and cyber espionage be handled? One tricky issue is how to deal with non-state hackers involved in every aspect of cyber aggression while providing plausible deniability to the host governments. For instance,...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.