Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Cyber Operations and Automatic Hack Backs Under International Law on Necessity

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      Elsevier
    • الموضوع:
      2024
    • Collection:
      Griffith University: Griffith Research Online
    • نبذة مختصرة :
      This article examines the use of automatic hack backs under international law on necessity. Hack backs are a form of active defence measure adopted in response to cybersecurity threats that involve effects outside the victim's systems or networks designed to mitigate or prevent the cybersecurity threat. Automatic hack backs are systems that, once activated, are capable of performing these functions without direct human control. The plea of necessity under international law on State responsibility provides a basis on which States can adopt measures that would otherwise be unlawful in order to respond to cyber operations that constitute a grave and imminent against their essential interests. This article argues that the use of automatic hack backs can be justified on the basis of necessity, however, the system would need to be capable of making a range of complex assessments to ensure it meets the strict criteria required by international law. The complexity of systems capable of making these assessments carries a risk unintended effects and escalation of conflict at machine speed. ; Full Text
    • ISSN:
      1873-6734
    • Relation:
      Computer Law and Security Review; Haataja, S, Cyber Operations and Automatic Hack Backs Under International Law on Necessity, Computer Law and Security Review, 2024, 53, pp. 105992; https://hdl.handle.net/10072/431070
    • الرقم المعرف:
      10.1016/j.clsr.2024.105992
    • الدخول الالكتروني :
      https://doi.org/10.1016/j.clsr.2024.105992
      https://hdl.handle.net/10072/431070
    • Rights:
      https://creativecommons.org/licenses/by/4.0/ ; © 2024 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). ; open access
    • الرقم المعرف:
      edsbas.5FEA2248