Jump to ContentJump to Main Navigation
Cyber WarLaw and Ethics for Virtual Conflicts$
Users without a subscription are not able to see the full content.

Jens David Ohlin, Kevin Govern, and Claire Finkelstein

Print publication date: 2015

Print ISBN-13: 9780198717492

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780198717492.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 21 September 2018

Cyber Espionage or Cyberwar?

Cyber Espionage or Cyberwar?

International Law, Domestic Law, and Self-Protective Measures

Chapter:
8 Cyber Espionage or Cyberwar?
Source:
Cyber War
Author(s):

Christopher S Yoo

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780198717492.003.0009

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two Chinese army colonels. Such conduct is instead relegated to the law of espionage and is thus governed almost entirely by domestic law. The absence of an overarching international law solution to this problem heightens the importance of technological self-protective measures.

Keywords:   Tallinn Manual, law of war, jus ad bellum, jus in bello, cyber espionage, Snowden, Stuxnet

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .