Cyber-warfare: jus post bellum
Rowe, Neil C.
Huntley, Wade L.
MetadataShow full item record
There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea. Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Galluch, Peter G. (Monterey, California. Naval Postgraduate School, 1996-06);This thesis examines the extent to which modern maneuver warfare theory is relevant to naval warfare and the US Navy's new strategic concept. This question is important because Naval Doctrine Command, established to translate ...
Developing a software model to assess a nation's capability to conduct sustained, offensive cyber warfare McElheny, Aric L. (Monterey, California. Naval Postgraduate School, 2011-09);This research provides a Situational Influence Assessment Module (SIAM) software model for assessing the capability of a country to conduct sustained, offensive cyber warfare. The SIAM Cyber Warfare Capability Model ...
Hindert, Johann (Monterey, California: Naval Postgraduate School, 2015-06);Increasingly, so-called weak actors employ irregular warfare to successfully challenge the strong. The British, French, and Americans are recognized for their irregular warfare experience, but the comparatively rich German ...