Book contents
- Unilateral Remedies to Cyber Operations
- Unilateral Remedies to Cyber Operations
- Copyright page
- Dedication
- Contents
- Preface
- Acknowledgements
- Part I Cybersecurity Incidents and International Law
- Part II Unilateral Remedies to Cybersecurity Incidents
- Part III Outlines of an Emergency Regime for Cyberspace
- 7 Transnational Cybersecurity, Unilateral Remedies, and the Rule of Law
- 8 ‘Such Incidents Might Recur at Any Time’
- 9 Possible Elements of the Cyber Emergency Regime
- 10 Concluding Remarks
- Bibliography
- Index
10 - Concluding Remarks
from Part III - Outlines of an Emergency Regime for Cyberspace
Published online by Cambridge University Press: 31 March 2020
- Unilateral Remedies to Cyber Operations
- Unilateral Remedies to Cyber Operations
- Copyright page
- Dedication
- Contents
- Preface
- Acknowledgements
- Part I Cybersecurity Incidents and International Law
- Part II Unilateral Remedies to Cybersecurity Incidents
- Part III Outlines of an Emergency Regime for Cyberspace
- 7 Transnational Cybersecurity, Unilateral Remedies, and the Rule of Law
- 8 ‘Such Incidents Might Recur at Any Time’
- 9 Possible Elements of the Cyber Emergency Regime
- 10 Concluding Remarks
- Bibliography
- Index
Summary
In light of some of the legal challenges as regards unilateral remedies to cyber operations, in large part, but not only a consequence of the attribution problem, the present study has made an attempt to modestly propose the outlines of a possible special emergency regime for cyberspace. Acknowledging that the difficulty in identifying reasonably quickly the perpetrator of malicious conduct is a function of software code and the original design of the global cyber infrastructures, and thus structural, necessity is likely to become more significant as a circumstance precluding the wrongfulness of protective state conduct. Considering the concept’s shortcomings, a newly established primary rule seems preferable.
- Type
- Chapter
- Information
- Unilateral Remedies to Cyber OperationsSelf-Defence, Countermeasures, Necessity, and the Question of Attribution, pp. 282 - 284Publisher: Cambridge University PressPrint publication year: 2020