TY - GEN
T1 - A legal understanding of state-linked cyberattacks and malicious cyber activities
AU - Watney, Murdoch
N1 - Publisher Copyright:
© 2019, Curran Associates Inc. All rights reserved.
PY - 2019
Y1 - 2019
N2 - Many countries have fallen victim to state-linked cyberattacks and malicious activities. State-linked cyber operations pose serious legal threats and challenges to the stability and security of cyberspace. The discussion aims to establish a legal understanding pertaining to the differences and similarities between state-linked cyber operations such as cyberattacks and malicious cyber activities. In many instances, the terms are used interchangeably. Conduct that may be considered as malicious activities are referred to as cyberattacks. However, cyberattacks and malicious activities are not the same and the consequences and motive for the state-linked cross-border cyber operation may differ. State-linked cyberattacks is defined as a cyber operation that is reasonably expected to cause injury or death to persons or damage or destruction to objects such as DDoS attacks or ransomware attacks. State-linked malicious cyber activities consist of theft of information (espionage), disinformation and false websites. Malicious activities do not cause physical harm to persons or objects. However, the harm in the instance of espionage may consist of financial loss and/or undermining trust in the ability of the government to protect sensitive information or sowing political and social discord such as interference in another country’s elections or referendums. Cyber operations evoke various debatable questions such as how should a victim state respond to state-linked cyber operations and when does state behaviour in a foreign cyberspace constitute an act of cyber war or information war? Drawing a clear distinction is relevant when it comes to a victim state’s response to a foreign state’s cyber operation in their cyberspace on national, international and global level. Stability and security in cyberspace may be achieved by means of international norms governing state behaviour specifically cross-border cyber operations. Although a country should not abuse the cyberspace of another country, the discussion debates the negotiation and enforcement of cyber norms governing state behaviour and how countries should respond to unlawful cyber operations on national and global level.
AB - Many countries have fallen victim to state-linked cyberattacks and malicious activities. State-linked cyber operations pose serious legal threats and challenges to the stability and security of cyberspace. The discussion aims to establish a legal understanding pertaining to the differences and similarities between state-linked cyber operations such as cyberattacks and malicious cyber activities. In many instances, the terms are used interchangeably. Conduct that may be considered as malicious activities are referred to as cyberattacks. However, cyberattacks and malicious activities are not the same and the consequences and motive for the state-linked cross-border cyber operation may differ. State-linked cyberattacks is defined as a cyber operation that is reasonably expected to cause injury or death to persons or damage or destruction to objects such as DDoS attacks or ransomware attacks. State-linked malicious cyber activities consist of theft of information (espionage), disinformation and false websites. Malicious activities do not cause physical harm to persons or objects. However, the harm in the instance of espionage may consist of financial loss and/or undermining trust in the ability of the government to protect sensitive information or sowing political and social discord such as interference in another country’s elections or referendums. Cyber operations evoke various debatable questions such as how should a victim state respond to state-linked cyber operations and when does state behaviour in a foreign cyberspace constitute an act of cyber war or information war? Drawing a clear distinction is relevant when it comes to a victim state’s response to a foreign state’s cyber operation in their cyberspace on national, international and global level. Stability and security in cyberspace may be achieved by means of international norms governing state behaviour specifically cross-border cyber operations. Although a country should not abuse the cyberspace of another country, the discussion debates the negotiation and enforcement of cyber norms governing state behaviour and how countries should respond to unlawful cyber operations on national and global level.
KW - Cross-border state cyber operations
KW - Cyberattack
KW - Law
KW - Malicious cyber activities
KW - Norms for state behaviour in cyberspace
KW - State cyber operations and international law
UR - http://www.scopus.com/inward/record.url?scp=85069990985&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85069990985
T3 - European Conference on Information Warfare and Security, ECCWS
SP - 560
EP - 567
BT - Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019
A2 - Cruz, Tiago
A2 - Simoes, Paulo
PB - Curran Associates Inc.
T2 - 18th European Conference on Cyber Warfare and Security, ECCWS 2019
Y2 - 4 July 2019 through 5 July 2019
ER -