continues to apply LOAC to cyber conflicts and remains unable to definitively attribute attacks, it will be unable to deter future cyber-attacks. Finally, the research will show that if the U.S. LOAC is explored with consideration of how these international laws apply to operations in the cyber domain. It studies attribution and how difficulties in this area create significant issues for deterrence of cyber-attacks. This research examines the unique new cyber battle space and explains why it poses a significant threat to the U.S. Traditional models of deterrence such as Mutually Assured Destruction (MAD) have worked well with nuclear weapons but applying these traditional models to cyber-attacks becomes challenging when one considers the difficulty of attribution and the limitations of operating within the confines of the international Law of Armed Conflict (LOAC). has proven seemingly unable to deter these attacks and remains notably vulnerable to attacks in cyberspace. Yet when it comes to cyber-attacks, the Sony and OPM incidents show the U.S. The United States possesses the most powerful and technologically advanced military forces in the world and has successfully deterred most conventional attacks against its homeland. Incidents such as the 2010 Stuxnet attack on an Iranian Uranium enrichment facility, the 2008 Russian cyber-attack on the country of Georgia, the 2014 attack on Sony Pictures Entertainment, and the 2015 discovery of a substantial compromise of the United States Office of Personnel Management are just a few recent examples of the significant and dangerous role cyber operations play in world conflicts. Recent history is full of events demonstrating the serious effects of cyber-attacks and the prominent role they play in global events. Law of Armed Conflict, Attribution, and the Challenges of Deterring Cyber-attacks
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |