메뉴 건너뛰기




Volumn 14, Issue , 2010, Pages 85-130

World Wide Warfare – Jus ad bellum and the Use of Cyber Force

(1)  Roscini, Marco a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85181951166     PISSN: 13894633     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (54)

References (141)
  • 1
    • 80053465803 scopus 로고    scopus 로고
    • The White House, Office of the Press Secretary Press Release, 29 May < >
    • 1 The White House, Office of the Press Secretary, “Remarks on securing the nation’s cyber infrastructure”, Press Release, 29 May 2009, .
    • (2009) Remarks on securing the nation’s cyber infrastructure
  • 2
    • 85181969004 scopus 로고    scopus 로고
    • < >
    • ).
  • 3
    • 85181881484 scopus 로고    scopus 로고
    • 2 May 2007 – 20 March at GL-7 < >
    • 1, 2 May 2007 – Incorporating Change 1, 20 March 2009, at GL-7 ).
    • (2009) Incorporating Change 1
  • 4
    • 85181869065 scopus 로고    scopus 로고
    • < >
  • 5
    • 85181900542 scopus 로고    scopus 로고
    • The new United States National Security Strategy also recalls he very technologies that empower us to lead and create also empower those who would disrupt and destroy
    • that “[t May
    • The new United States National Security Strategy also recalls that “[t]he very technologies that empower us to lead and create also empower those who would disrupt and destroy”, National Security Strategy, May 2010, 27
    • (2010) National Security Strategy , pp. 27
  • 6
    • 85181929799 scopus 로고    scopus 로고
    • < >
    • .
  • 8
    • 85181962548 scopus 로고    scopus 로고
    • United States National Strategy to Secure Cyberspace, note 3, 6. power: a cyber attack could for instance disable power generators, cut off the military command, control and communication systems, cause trains to derail and airplanes to crash, nuclear reactors to melt down, pipelines to explode, weapons to malfunction
    • 6 United States National Strategy to Secure Cyberspace, see note 3, 6. power: a cyber attack could for instance disable power generators, cut off the military command, control and communication systems, cause trains to derail and airplanes to crash, nuclear reactors to melt down, pipelines to explode, weapons to malfunction.
  • 9
    • 85181933482 scopus 로고    scopus 로고
    • It is therefore hardly surprising that cyber security has become a general concern of the international community, with the UN General Assembly adopting a series of resolutions on the emphasizing that “the dissemination and use of information technologies and means affect the interests of the entire international community,”7 that “the criminal misuse of information technologies may have a grave impact on all States”8 and that these technologies “can potentially be used for purposes that are inconsistent with the objectives of maintaining international stability and security.”9 The General Assembly also endorsed the holding of the World Summit on the Information Society, that took place, in two phases, in
    • 10
    • (2005) Geneva in 2003 and Tunis in , vol.10
  • 10
    • 85181936832 scopus 로고    scopus 로고
    • One of the perspectives from which an international lawyer can study the problem of cyber security is that of jus ad bellum, i.e. the rules that regulate the use of armed force by states in their international relations.11 In fact, although – as will be seen – identification is problematic, several states have been the target of cyber attacks of which other states were suspected. In certain cases, the cyber attacks were an end in themselves. The United States, for instance, has been the target
    • 11 In fact, although – as will be seen – identification is problematic, several states have been the target of cyber attacks of which other states were suspected. In certain cases, the cyber attacks were an end in themselves. The United States, for instance, has been the target
  • 11
    • 85181928366 scopus 로고    scopus 로고
    • e.g., the A/RES/55/28 of 20 November
    • 7 See, e.g., the Preambles of Resolutions A/RES/55/28 of 20 November 2000,
    • (2000) Preambles of Resolutions
  • 12
    • 85181933079 scopus 로고    scopus 로고
    • A/RES/56/19 of 29 November 2001, A/RES/59/61 of 3 December
    • A/RES/56/19 of 29 November 2001, A/RES/59/61 of 3 December 2004,
    • (2004)
  • 13
    • 85181874569 scopus 로고    scopus 로고
    • A/RES/60/45 of 8 December 2005, A/RES/61/54 of 6 December 2006
    • A/RES/60/45 of 8 December 2005, A/RES/61/54 of 6 December 2006,
  • 14
    • 85181892200 scopus 로고    scopus 로고
    • A/RES/62/17 of 5 December 2007, A/RES/63/37 of 2 December 2008, A/RES/64/25 of 2 December
    • A/RES/62/17 of 5 December 2007, A/RES/63/37 of 2 December 2008, A/RES/64/25 of 2 December 2009.
    • (2009)
  • 15
    • 85181975429 scopus 로고    scopus 로고
    • e.g, RES/55/63 of 4 December 2000, A/RES/56/121 of 19 December
    • 8 See, e.g., the Preambles of Resolutions A/RES/55/63 of 4 December 2000, A/RES/56/121 of 19 December 2001.
    • (2001) the Preambles of Resolutions A
  • 16
    • 85181870532 scopus 로고    scopus 로고
    • For the documents adopted Summit, < >
    • 10 For the documents adopted at the Summit, see .
  • 17
    • 78649604442 scopus 로고    scopus 로고
    • From Nuclear War to Net War: Analogizing Cyber Attacks in International Law
    • seq. 204
    • S.J. Shackelford, “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law”, Berkeley Journal of International Law 27 (2009), 192 et seq. (204).
    • (2009) Berkeley Journal of International Law , vol.27
    • Shackelford, S.J.1
  • 18
    • 84860304743 scopus 로고    scopus 로고
    • Why States Need an International Law for Information Operations
    • 13 D.B. Hollis, “Why States Need an International Law for Information Operations”, Lewis and Clark Law Review 11 (2007), 1023
    • (2007) Lewis and Clark Law Review , vol.11 , pp. 1023
    • Hollis, D.B.1
  • 19
    • 84898309164 scopus 로고    scopus 로고
    • Thousands of cyber attacks each day on key utilities
    • August According to the Annual Report 2009-2010
    • 14 J. Richards, “Thousands of cyber attacks each day on key utilities”, The Times, 23 August 2008. According to the Annual Report 2009-2010
    • (2008) The Times,
    • Richards, J.1
  • 20
    • 85181953053 scopus 로고    scopus 로고
    • < >
  • 21
    • 78649344427 scopus 로고    scopus 로고
    • Kingdom Intelligence and Security Committee, March
    • , United Kingdom Intelligence and Security Committee, Annual Report 2009-2010, March 2010, 16.
    • (2010) Annual Report 2009-2010 , pp. 16
  • 22
    • 34547163843 scopus 로고    scopus 로고
    • At Light Speed’: Attribution and Response to Cyber-crime/Terrorism/Warfare
    • et seq. 402
    • 15 S.W. Brenner, “‘At Light Speed’: Attribution and Response to Cyber-crime/Terrorism/Warfare”, Journal of Criminal Law and Criminology 97 (2006-2007), 379 et seq. (402).
    • (2006) Journal of Criminal Law and Criminology , vol.97 , pp. 379
    • Brenner, S.W.1
  • 23
    • 84991649930 scopus 로고    scopus 로고
    • Cyber attackers target South Korea and US
    • 8 July
    • 16 M. Weaver, “Cyber attackers target South Korea and US”, The Guardian, 8 July 2009.
    • (2009) The Guardian
    • Weaver, M.1
  • 24
    • 85181948670 scopus 로고    scopus 로고
    • Hackers Tag Lithuanian Web Sites With Soviet Symbols
    • June 2008, after the Lithuanian Parliament adopted a law prohibiting the public display of Soviet symbols, political and private websites were defaced, 1 July
    • 17 In June 2008, after the Lithuanian Parliament adopted a law prohibiting the public display of Soviet symbols, political and private websites were defaced, S. Rhodin, “Hackers Tag Lithuanian Web Sites With Soviet Symbols”, The New York Times, 1 July 2008.
    • (2008) The New York Times
    • Rhodin, S.1
  • 26
    • 85181973504 scopus 로고    scopus 로고
    • Swiss Ministry Suffers Cyber Attack
    • 28 October < >
    • 19 M. Barkoviak, “Swiss Ministry Suffers Cyber Attack”, Daily Tech, 28 October 2009 .
    • (2009) Daily Tech
    • Barkoviak, M.1
  • 27
    • 85181970637 scopus 로고    scopus 로고
    • A cyber attack forced the shut down of more than 150 websites, including the postal service and several banks’ websites in March 2010. < >
    • 20 A cyber attack forced the shut down of more than 150 websites, including the postal service and several banks’ websites in March 2010. The attack apparently originated in Kosovo .
    • The attack apparently originated in Kosovo
  • 28
    • 85181903585 scopus 로고    scopus 로고
    • Computer Network Attack as a Use of Force under Article 2 (4) of the United Nations Charter
    • note 11
    • D.B. Silver, “Computer Network Attack as a Use of Force under Article 2 (4) of the United Nations Charter”, in: Schmitt/ O’Donnell, see note 11, 74;
    • Schmitt/ O’Donnell , pp. 74
    • Silver, D.B.1
  • 29
    • 84924014270 scopus 로고    scopus 로고
    • The Battlefield of Cyberspace: The Inevitable New Military Branch – The Cyber Force
    • et seq. 315
    • N. Solce, “The Battlefield of Cyberspace: The Inevitable New Military Branch – The Cyber Force”, Albany Law Journal of Science and Technology 18 (2008), 293 et seq. (315).
    • (2008) Albany Law Journal of Science and Technology , vol.18 , pp. 293
    • Solce, N.1
  • 30
    • 85181912031 scopus 로고    scopus 로고
    • < > Cooperative Cyber Defense Centre of Excellence (CCDCOE), Cyber Attacks Against Georgia: Legal Lessons Identified, November 2008, 5
    • 22 Cooperative Cyber Defense Centre of Excellence (CCDCOE), Cyber Attacks Against Georgia: Legal Lessons Identified, November 2008, 5.
  • 31
    • 76949088842 scopus 로고    scopus 로고
    • Before the Gunfire, Cyberattacks
    • 13 August Defacement” is the replacement of the content of the website in order to change its visual appearance
    • 23 J. Markoff, “Before the Gunfire, Cyberattacks”, The New York Times, 13 August 2008. “Defacement” is the replacement of the content of the website in order to change its visual appearance.
    • (2008) The New York Times
    • Markoff, J.1
  • 32
    • 84867300586 scopus 로고    scopus 로고
    • The ‘Korean’ Cyber Attacks and Their Implications for Cyber Conflict
    • < >, Centre for Strategic and International Studies (CSIS), October
    • 24 , J.A. Lewis, “The ‘Korean’ Cyber Attacks and Their Implications for Cyber Conflict”, Centre for Strategic and International Studies (CSIS), October 2009, 8.
    • (2009) , pp. 8
    • Lewis, J.A.1
  • 33
    • 84860318578 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • et seq. 890 – 891
    • 26 M.N. Schmitt, “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework”, Colum. J. Transnat’l L. 37 (1998-1999), 885 et seq. (890 – 891).
    • (1998) Colum. J. Transnat’l L. , vol.37 , pp. 885
    • Schmitt, M.N.1
  • 35
    • 84865309180 scopus 로고    scopus 로고
    • Combatant Status and Computer Network Attack
    • et seq. 400 et seq
    • 29 S. Watts, “Combatant Status and Computer Network Attack”, Va. J. Int’l L. 50 (2010), 391 et seq. (400 et seq.).
    • (2010) Va. J. Int’l L. , vol.50 , pp. 391
    • Watts, S.1
  • 37
    • 84861017078 scopus 로고    scopus 로고
    • Computer Network Attacks and Self-Defense
    • note 11
    • 31 Y. Dinstein, “Computer Network Attacks and Self-Defense”, in: Schmitt/ O’Donnell, see note 11, 101;
    • Schmitt/ O’Donnell , pp. 101
    • Dinstein, Y.1
  • 38
    • 84882603351 scopus 로고    scopus 로고
    • How do you know you are at War in the Information Age?
    • R.W. Aldrich, “How do you know you are at War in the Information Age?”, Houston Journal of International Law 22 (1999-2000), 223
    • (1999) Houston Journal of International Law , vol.22 , pp. 223
    • Aldrich, R.W.1
  • 39
    • 84959119624 scopus 로고    scopus 로고
    • Cyber-spies based in China target Indian Government and Dalai Lama
    • 6 April
    • Dalai Lama, T. Branigan, “Cyber-spies based in China target Indian Government and Dalai Lama”, The Guardian, 6 April 2010.
    • (2010) The Guardian
    • Lama, D.1    Branigan, T.2
  • 40
    • 26044472584 scopus 로고    scopus 로고
    • Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2 (4) of the U.N. Charter
    • et seq. 572
    • T.A. Morth, “Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2 (4) of the U.N. Charter”, Case Western Reserve Journal of International Law 30 (1998), 567 et seq. (572).
    • (1998) Case Western Reserve Journal of International Law , vol.30 , pp. 567
    • Morth, T.A.1
  • 41
    • 85048925428 scopus 로고    scopus 로고
    • Confronting Threats Through Unconventional Means: Offensive Information Warfare as a Covert Alternative to Preemptive War
    • et seq. 888 889
    • 33 S.J. Cox, “Confronting Threats Through Unconventional Means: Offensive Information Warfare as a Covert Alternative to Preemptive War”, Houston Law Review 42 (2005-2006), 881 et seq. (888 - 889).
    • (2005) Houston Law Review , vol.42 , pp. 881
    • Cox, S.J.1
  • 43
    • 85181954487 scopus 로고    scopus 로고
    • < > Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare, March 2010, 34
    • 40 Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare, March 2010, 34 .
  • 44
    • 0345388935 scopus 로고    scopus 로고
    • Chairman of the Joint Chiefs of Staff, note 27, emphasis added
    • 42 Chairman of the Joint Chiefs of Staff, Joint Doctrine for Information Operations, see note 27, II-5 (emphasis added).
    • Joint Doctrine for Information Operations
  • 47
    • 85181913924 scopus 로고    scopus 로고
    • A Different Kettle of Fish: Computer Network Attack
    • note 11
    • 50 R. Barnett, “A Different Kettle of Fish: Computer Network Attack”, in: Schmitt/ O’Donnell, see note 11, 22.
    • Schmitt/ O’Donnell , pp. 22
    • Barnett, R.1
  • 48
    • 85181947737 scopus 로고    scopus 로고
    • Read the text of the articles in: ILC ed, Two, 26 et seq
    • 52 Read the text of the articles in: ILC (ed.), Yearbook of the International Law Commission, 2001, Vol. II, Part Two, 26 et seq.
    • (2001) Yearbook of the International Law Commission , vol.2
  • 49
    • 84857399553 scopus 로고    scopus 로고
    • Getting It Right: Protecting American Critical Infrastructure in Cyberspace
    • et seq. 405
    • 53 S.M. Condron, “Getting It Right: Protecting American Critical Infrastructure in Cyberspace”, Harvard Journal of Law and Technology 20 (2006-2007), 373 et seq. (405);
    • (2006) Harvard Journal of Law and Technology , vol.20 , pp. 373
    • Condron, S.M.1
  • 50
    • 26044472171 scopus 로고    scopus 로고
    • Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defence
    • et seq. (212); Watts, note 29, 405
    • E.T. Jensen, “Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defence”, Stanford J. Int’l L. 38 (2002), 207 et seq. (212); Watts, see note 29, 405.
    • (2002) Stanford J. Int’l L. , vol.38 , pp. 207
    • Jensen, E.T.1
  • 52
    • 84887248718 scopus 로고    scopus 로고
    • US appoints first cyber warfare general
    • 23 May
    • 55 P. Beaumont, “US appoints first cyber warfare general”, The Observer, 23 May 2010, 10.
    • (2010) The Observer , pp. 10
    • Beaumont, P.1
  • 54
    • 84886524825 scopus 로고    scopus 로고
    • Italy Weighs Cyber-Defense Command
    • 31 May < >
    • 57 T. Kington, “Italy Weighs Cyber-Defense Command”, Defense News, 31 May 2010, .
    • (2010) Defense News
    • Kington, T.1
  • 58
    • 84856018608 scopus 로고    scopus 로고
    • Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield
    • paras 12-18 < >
    • 62 J.A. Ophardt, “Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield”, Duke Law and Technology Review 3 (2010), paras 12-18 .
    • (2010) Duke Law and Technology Review , vol.3
    • Ophardt, J.A.1
  • 59
    • 85181903935 scopus 로고    scopus 로고
    • < >
    • ,
  • 60
    • 27844541278 scopus 로고    scopus 로고
    • Case IT-94-1-A, Appeals Chamber, Judgment, 15 July < >, para. 117
    • 66 ICTY, Prosecutor v. Tadić, Case No. IT-94-1-A, Appeals Chamber, Judgment, 15 July 1999, , para. 117.
    • (1999) Prosecutor v. Tadić
  • 61
    • 78649388905 scopus 로고    scopus 로고
    • Conceptualizing Aggression
    • 20
    • 72 N. Weisbord, “Conceptualizing Aggression”, Duke J. Comp. & Int’l L. 20 (2009), 1 et seq. (20).
    • (2009) Duke J. Comp. & Int’l L. , vol.20
    • Weisbord, N.1
  • 62
    • 85181967747 scopus 로고    scopus 로고
    • When expressly provided, however, incitement can be an unlawful act per se, e.g., article III of the 1948 Genocide Convention
    • 74 When expressly provided, however, incitement can be an unlawful act per se, see, e.g., article III of the 1948 Genocide Convention.
  • 63
    • 85050748734 scopus 로고    scopus 로고
    • note 12, 208
    • 79 Shackelford, see note 12, 208.
    • Shackelford
  • 65
    • 85181942889 scopus 로고
    • A/RES/36/103 of 9 December
    • 81 A/RES/36/103 of 9 December 1981.
    • (1981)
  • 66
    • 33847001941 scopus 로고
    • Eighth Report on State Responsibility
    • ILC ed, One
    • R. Ago, “Eighth Report on State Responsibility”, in: ILC (ed.), Yearbook of the International Law Commission, 1980, Vol. II, Part One, 44;
    • (1980) Yearbook of the International Law Commission, , vol.2 , pp. 44
    • Ago, R.1
  • 67
    • 77953338535 scopus 로고    scopus 로고
    • Jus ad bellum: Plus Ça Change (Le Monde) Plus C’Est la Même Chose (Le Droit)?
    • seq. 169
    • R. Müllerson, “Jus ad bellum: Plus Ça Change (Le Monde) Plus C’Est la Même Chose (Le Droit)?”, Journal of Conflict and Security Law 7 (2002), 149 et seq. (169);
    • (2002) Journal of Conflict and Security Law , vol.7
    • Müllerson, R.1
  • 69
    • 85010716793 scopus 로고    scopus 로고
    • Threats of Armed Force and Contemporary International Law
    • et seq. 235
    • 84 M. Roscini, “Threats of Armed Force and Contemporary International Law”, NILR 54 (2007), 229 et seq. (235).
    • (2007) NILR , vol.54 , pp. 229
    • Roscini, M.1
  • 70
    • 0003882752 scopus 로고    scopus 로고
    • Legality of the Threat or Use of Nuclear Weapons
    • 86 Legality of the Threat or Use of Nuclear Weapons, ICJ Reports 1996, 226
    • (1996) ICJ Reports , pp. 226
  • 71
    • 85181928932 scopus 로고    scopus 로고
    • et seq. 246 para. 47
    • et seq. (246 para. 47).
  • 74
    • 85181876172 scopus 로고    scopus 로고
    • Article 2 (4)
    • note
    • 90 A. Randelzhofer, “Article 2 (4)”, in: Simma, see note 87, 118.
    • Simma , vol.87 , pp. 118
    • Randelzhofer, A.1
  • 77
    • 84865553537 scopus 로고    scopus 로고
    • The Use of Cyber Force: Need for Legal Justification?
    • et seq. 384-385
    • M. Benatar, “The Use of Cyber Force: Need for Legal Justification?”, Göttingen Journal of International Law 1 (2009), 375 et seq. (384-385).
    • (2009) Göttingen Journal of International Law , vol.1 , pp. 375
    • Benatar, M.1
  • 79
    • 84896533187 scopus 로고    scopus 로고
    • A Helpless America? An Examination of the Legal Options Available to the United States in Response to Varying Types of Cyber-Attacks from China
    • et seq. 652
    • D.M. Creekman, “A Helpless America? An Examination of the Legal Options Available to the United States in Response to Varying Types of Cyber-Attacks from China”, Am. U. Int’l L. Rev. 17 (2002), 642 et seq. (652).
    • (2002) Am. U. Int’l L. Rev. , vol.17 , pp. 642
    • Creekman, D.M.1
  • 80
    • 85181908323 scopus 로고    scopus 로고
    • < of Staff>, Joint Vision 2020 – America’s Military: Preparing for Tomorrow, June 2000, 23. release of a lethal agent.”106 In his remarks on the new White House cyber security office, President Obama also qualified attacks on defense and military networks as a “weapon of mass disruption.”107 The Russian Federation has been supporting for many years the conclusion of a “disarmament” agreement banning the development, production and use of particularly dangerous information weapons.108 When submitting its views to the UN Secretary-General, in particular, the Russian Federation declared that “information weapons” can have “devastating consequences comparable to the effect of weapons of mass destruction.”109 Therefore, “the use of Information Warfare against the Russian Federation or its armed forces will categorically not be considered a non-military phase of a conflict whether there were casualties or not.”110 The United Kingdom Under-Secretary for security and counter-terrorism also declared that a cyber attack that took out a power station would be an act of war,111 and the Estonian Defense Minister equated cyber blockades to naval blockades on ports preventing a state’s access to the world.112
    • 112
  • 82
    • 85181874805 scopus 로고    scopus 로고
    • At Internet Conference, Signs of Agreement Appear Between U.S. and Russia
    • 15 April
    • 108 J. Markoff, “At Internet Conference, Signs of Agreement Appear Between U.S. and Russia”, The New York Times, 15 April 2010.
    • (2010) The New York Times
    • Markoff, J.1
  • 83
    • 85181874170 scopus 로고    scopus 로고
    • Is It Time for a Treaty on Information Warfare?
    • note 11
    • 109 P.A. Johnson, “Is It Time for a Treaty on Information Warfare?”, in: Schmitt/ O’Donnell, see note 11, 443.
    • Schmitt/ O’Donnell , pp. 443
    • Johnson, P.A.1
  • 84
    • 84865312723 scopus 로고    scopus 로고
    • Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places?
    • Quote from the speech of a senior Russian military officer, reported in: seq. 166
    • 110 Quote from the speech of a senior Russian military officer, reported in: V.M. Antolin-Jenkins, “Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places?”, Naval Law Review 51 (2005), 132 et seq. (166).
    • (2005) Naval Law Review , vol.51
    • Antolin-Jenkins, V.M.1
  • 85
    • 85176604908 scopus 로고    scopus 로고
    • Britain fends off flood of foreign cyber-attacks
    • 7 March
    • 111 J. Doward, “Britain fends off flood of foreign cyber-attacks”, The Observer, 7 March 2010, 19.
    • (2010) The Observer , pp. 19
    • Doward, J.1
  • 86
    • 85181927694 scopus 로고    scopus 로고
    • < >
    • .
  • 88
    • 85181937819 scopus 로고    scopus 로고
    • Certain situations envisaged in A/RES/3314 (XXIX) of 14 December 1974 containing the Definition of Aggression could well cover cyber attacks as well. In any case, the list contained in the Definition is not exhaustive and is not binding on the Security Council
    • 114 Certain situations envisaged in A/RES/3314 (XXIX) of 14 December 1974 containing the Definition of Aggression could well cover cyber attacks as well. In any case, the list contained in the Definition is not exhaustive and is not binding on the Security Council.
  • 90
    • 85181935415 scopus 로고
    • It is well-known that the drafters of the Charter deliberately left the notion undefined, United Nations Conference on International Organization
    • 116 It is well-known that the drafters of the Charter deliberately left the notion undefined, United Nations Conference on International Organization, Documents, Vol. XII, 1945, 505.
    • (1945) Documents , vol.12 , pp. 505
  • 91
    • 1542422663 scopus 로고    scopus 로고
    • DoD, note 27
    • 117 DoD, An Assessment, see note 27, 15.
    • An Assessment , pp. 15
  • 92
    • 85181908517 scopus 로고    scopus 로고
    • note 22, 17
    • 120 CCDCOE Report, see note 22, 17.
    • CCDCOE Report
  • 94
    • 33645134706 scopus 로고    scopus 로고
    • A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
    • et seq. 212-213
    • D. Brown, “A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict”, Harv. Int’l L. J. 47 (2006), 179 et seq. (212-213).
    • (2006) Harv. Int’l L. J. , vol.47 , pp. 179
    • Brown, D.1
  • 96
    • 0013115268 scopus 로고    scopus 로고
    • Article 50 para. 1 of the ILC Articles on State Responsibility, note 52. also note 86, 246 para. 46
    • 129 Article 50 para. 1 of the ILC Articles on State Responsibility, see note 52. See also ICJ Reports 1996, see note 86, 246 para. 46.
    • (1996) ICJ Reports
  • 98
    • 85181942498 scopus 로고    scopus 로고
    • S/RES/1368 of 12 September 2001 and S/RES/1373 (2001) of 28 September 2001
    • 135 See S/RES/1368 (2001) of 12 September 2001 and S/RES/1373 (2001) of 28 September 2001.
    • (2001)
  • 99
    • 0013115268 scopus 로고    scopus 로고
    • note 64, 101 para. 191, 103 para. 195
    • 136 ICJ Reports 1986, see note 64, 101 para. 191, 103 para. 195.
    • (1986) ICJ Reports
  • 101
    • 84865407269 scopus 로고    scopus 로고
    • Information Warfare as International Coercion: Elements of a Legal Framework
    • et seq. (855)) cannot thus be shared
    • (C.C. Joyner/ C. Lotrionte, “Information Warfare as International Coercion: Elements of a Legal Framework”, EJIL 12 (2001), 825 et seq. (855)) cannot thus be shared.
    • (2001) EJIL , vol.12 , pp. 825
    • Joyner, C.C.1    Lotrionte, C.2
  • 103
    • 85181883966 scopus 로고    scopus 로고
    • In America’s new cyber war Google is on the front line
    • 19 January
    • 144 M. Glenny, “In America’s new cyber war Google is on the front line”, The Guardian, 19 January 2010, 32.
    • (2010) The Guardian , pp. 32
    • Glenny, M.1
  • 104
    • 85181939943 scopus 로고    scopus 로고
    • e.g., A/RES/58/199 of 23 December
    • 145 See, e.g., A/RES/58/199 of 23 December 2003.
    • (2003)
  • 105
    • 1542422663 scopus 로고    scopus 로고
    • DoD, note 27
    • 146 DoD, An Assessment, see note 27, 16.
    • An Assessment , pp. 16
  • 106
    • 85181919902 scopus 로고    scopus 로고
    • Public Law 107-56, 26 October Section 1016 e. at < >
    • 147 Public Law 107-56, 26 October 2001, Section 1016 (e). The text can be read at .
    • (2001) The text can be read
  • 110
    • 84949990000 scopus 로고    scopus 로고
    • L’Etat avant le droit? L’exception de ‘sécurité nationale’ en droit international
    • et seq. 8-16
    • 153 Th. Christakis, “L’Etat avant le droit? L’exception de ‘sécurité nationale’ en droit international”, RGDIP 112 (2008), 5 et seq. (8-16).
    • (2008) RGDIP , vol.112 , pp. 5
    • Th. Christakis1
  • 112
    • 84865542134 scopus 로고    scopus 로고
    • Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense
    • et seq. (453); Condron, note 53, 415-416
    • M. Hoisington, “Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense”, Boston College International and Comparative Law Review 32 (2009), 439 et seq. (453); Condron, see note 53, 415-416.
    • (2009) Boston College International and Comparative Law Review , vol.32 , pp. 439
    • Hoisington, M.1
  • 113
    • 1542422663 scopus 로고    scopus 로고
    • DoD, note 27
    • 158 DoD, An Assessment, see note 27, 21.
    • An Assessment , pp. 21
  • 114
    • 85181902056 scopus 로고    scopus 로고
    • Greenberg note 112
    • 159 Greenberg/ Goodman/ Soo Hoo, see note 112, 32.
    • Goodman/ Soo Hoo , pp. 32
  • 115
    • 85181888429 scopus 로고    scopus 로고
    • note 134, para. 7; Dinstein, note 31, 109
    • 160 Zemanek, see note 134, para. 7; Dinstein, see note 31, 109.
    • Zemanek
  • 116
    • 0013115268 scopus 로고    scopus 로고
    • note 143, 191 para. 64
    • 161 ICJ Reports 2003, see note 143, 191 para. 64.
    • (2003) ICJ Reports
  • 117
    • 85181895477 scopus 로고    scopus 로고
    • note 89, 139
    • 162 Robertson, Jr., see note 89, 139.
    • Robertson, J.1
  • 118
    • 85181922596 scopus 로고    scopus 로고
    • Cyber armies are gearing up in the cold war of the web
    • 25 June < >
    • 164 M. Glenny, “Cyber armies are gearing up in the cold war of the web”, The Guardian, 25 June 2009, .
    • (2009) The Guardian
    • Glenny, M.1
  • 119
    • 85074746222 scopus 로고    scopus 로고
    • Armed Activities on the Territory of the Congo (DRC v. Uganda)
    • et seq. 222 para. 143
    • 166 Armed Activities on the Territory of the Congo (DRC v. Uganda), ICJ Reports 2005, 168 et seq. (222 para. 143).
    • (2005) ICJ Reports , vol.168
  • 122
    • 84972016195 scopus 로고    scopus 로고
    • Note from Daniel Webster on the Caroline incident to Henry S. Fox of 24 April 1841
    • 172 Note from Daniel Webster on the Caroline incident to Henry S. Fox of 24 April 1841, in: British and Foreign State Papers 29 (1857), 1137-1138.
    • British and Foreign State Papers , vol.29 , Issue.1857 , pp. 1137-1138
  • 123
    • 27644445230 scopus 로고    scopus 로고
    • Classic examples of imminent attacks are an advancing army or ships on the horizon or a large scale mobilization of troops by an unfriendly neighboring state on its frontiers, IV, 18 November < >
    • 173 Classic examples of imminent attacks are an advancing army or ships on the horizon or a large scale mobilization of troops by an unfriendly neighboring state on its frontiers, W.H. Taft, IV, The Legal Basis for Preemption, 18 November 2002, ).
    • (2002) The Legal Basis for Preemption
    • Taft, W.H.1
  • 124
    • 85181890183 scopus 로고    scopus 로고
    • International Law, Cybernetics, and Cyberspace
    • note 11
    • 178 A. D’Amato, “International Law, Cybernetics, and Cyberspace”, in: Schmitt/ O’Donnell, see note 11, 69.
    • Schmitt/ O’Donnell , pp. 69
    • D’Amato, A.1
  • 125
    • 85181967568 scopus 로고
    • North Sea et seq. 43 para. 74
    • 180 North Sea Continental Shelf, ICJ Reports 1969, 3 et seq. (43 para. 74).
    • (1969) ICJ Reports , vol.3
    • Shelf, C.1
  • 126
    • 85181915789 scopus 로고    scopus 로고
    • Statement of Principles Applicable to the Formation of General Customary International Law
    • 181 Statement of Principles Applicable to the Formation of General Customary International Law, in: International Law Association (ILA), Report of the Sixty-Ninth Conference, 2000, 731.
    • (2000) International Law Association (ILA), Report of the Sixty-Ninth Conference , pp. 731
  • 127
    • 63049090801 scopus 로고    scopus 로고
    • Saving Customary International Law
    • seq. 151
    • 185 A.T. Guzman, “Saving Customary International Law”, Mich. J. Int’l L. 27 (2005-2006), 115 et seq. (151).
    • (2005) Mich. J. Int’l L. , vol.27
    • Guzman, A.T.1
  • 129
    • 85181950567 scopus 로고    scopus 로고
    • Associated Press, 14 April < >. A separate classified document discusses whether the United States should first ask the government from which the cyber attack originates to deal with it
    • 193 L.C. Baldor, “Military asserts right to return cyber attacks”, Associated Press, 14 April 2010, . A separate classified document discusses whether the United States should first ask the government from which the cyber attack originates to deal with it.
    • (2010) Military asserts right to return cyber attacks
    • Baldor, L.C.1
  • 130
    • 85181963242 scopus 로고    scopus 로고
    • Cyber Attack Response: The Military in a Support Role
    • 4 April < >
    • 194 N.C. Cabana, “Cyber Attack Response: The Military in a Support Role”, Chronicles On Line Journal, 4 April 2000, .
    • (2000) Chronicles On Line Journal
    • Cabana, N.C.1
  • 131
    • 85181940715 scopus 로고    scopus 로고
    • < >, E.M. Grossman, “U.S. General Reserves the Right to Use Force, Even Nuclear, in Response to Cyber Attack”, Global Security Newswire, 12 May 2009
    • 195 , E.M. Grossman, “U.S. General Reserves the Right to Use Force, Even Nuclear, in Response to Cyber Attack”, Global Security Newswire, 12 May 2009.
  • 135
    • 85181970582 scopus 로고    scopus 로고
    • < > NATO 2020: Assured Security; Dynamic Engagement, Analysis and Recommendations of the Group of Experts on a New Strategic Concept for NATO, 17 May 2010, 45
    • 201 NATO 2020: Assured Security; Dynamic Engagement, Analysis and Recommendations of the Group of Experts on a New Strategic Concept for NATO, 17 May 2010, 45.
  • 136
    • 85181872884 scopus 로고    scopus 로고
    • NATO’s new strategic concept should be adopted in November Lisbon
    • NATO’s new strategic concept should be adopted in November 2010 in Lisbon.
    • (2010)
  • 138
    • 84897378905 scopus 로고    scopus 로고
    • NATO and Global Cyber Defense
    • R. Sheperd ed, < >
    • 204 R.B. Hughes, “NATO and Global Cyber Defense”, in: R. Sheperd (ed.), The Bucharest Conference Papers, 2008, 48, ).
    • (2008) The Bucharest Conference Papers , vol.48
    • Hughes, R.B.1
  • 139
    • 85181932162 scopus 로고    scopus 로고
    • < >. Similar agreements have also been signed with Slovakia, Turkey, the United Kingdom and the United States
    • 205 See . Similar agreements have also been signed with Slovakia, Turkey, the United Kingdom and the United States.
  • 141
    • 85181933469 scopus 로고    scopus 로고
    • NATO 2020, note 201, 9
    • 208 NATO 2020, see note 201, 9.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.