When is a cyberattack a use of force or an armed attack?
Loading...
Authors
Boothby, William H.
von Heinegg, Wolff Heintschel
Michael, James Bret
Schmitt, Michael N.
Wingfield, Thomas C.
Subjects
Advisors
Date of Issue
2012-08
Date
Publisher
IEEE
Language
Abstract
News reports and public discussion about cyberattacks appear daily in traditional and social media. Cyberattacks used in the commission of crimes, such as stealing customer credit card information,
defacing websites, distributing child pornography via file-sharing sites, and creating and leasing out botnets, have become commonplace. Moreover, cyberattacks that once were considered extraordinary - in particular, those carried out as part of state-sponsored military or intelligence operations - will likely increase in frequency and severity.
Type
Article
Description
Series/Report No
Department
Electrical and Computer Engineering
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funder
Format
3 p.
Citation
W.H. Boothby, W.H. von Heinegg, J.B. Michael, M.N. Scmitt, T.C. Wingfield, "When is a cyberattack a use of force or an armed attack?", Computer, (August 2012), pp. 82-84.
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.