Historical Perspectives and Legal Aspects of Cyber Warfare
Historical development of cyber warfare follows three major historical periods: first period follows the technological advances of information technology during the 1980s until the end of the Cold War in 1990, second period is from the end of the Cold War to the terrorist attacks in United States during 11-th september 2001 year and the third period is from the terrorist attacks in United States during 11-th september 2001 year onwards. Each of the mentioned historical periods follows a specific doctrine and strategy of dealing with the national security threats from cyberspace. The world super powers and the world states, introduce appropriate strategies and national policies to deal with the consequences of this kind of warfare. Expression of cyberspace is linked to a short story titled "Burning Chrome" in the 1982 year written by American author William Gibson. In the following years, this word turned out to be conspicuously related to online PC systems. According to NATO, people are part of cyberspace. According to this, NATO defines that cyberspace is more than just internet, including not only hardware, software and information systems, but also peoples and social interaction with these networks. The first cyber warfare weapon ever known in history was Stuxnet. Stuxnet's objective was to physically annihilate a military target. Stuxnet has contaminated more than 60,000 PCs around the world, mostly in Iran. While international cooperation is essential, each nation should in near future develop a National foundation, its own national cyber security strategy, authorities and capabilities. Every nation state, should require effective coordination and cooperation among governmental entities at the national and sub-national levels as well as the private sector and civil society. The main hypothesis of this paper is to present the historical development and perspectives of cyber warfare and accordingly propose the best legal concepts, national doctrines and strategies for dealing with this modern type of warfare.
Artur Appazov. Legal aspects of cyber security, University of Copenhagen, 2014. Yugoslavia: Serb Hackers Reportedly Disrupt US Military Computer”, Bosnian Serb News Agency SRNA, 28 March 1999.
Clay Wilson, Botnets. Cybercrime and Cyber terrorism: Vulnerabilities and Policy Issues for Congress, Congressional Research Service Report for Congress, 2008.
Cyber War Also Rages in Middle East, The Associated Press, 28 October 2000.
Cyrus Farivar. “Cyberwar I. What the Attacks on Estonia Have Taught Us About Online Combat,” Slate, May 22, 2007.
David E. Hoffman, “CIA slipped bugs to Soviets,” Washington Post, 2004.
Eneken Tikk, Kadri Kaska & Liis Vihul, International Cyber Incidents: Legal Considerations, Tallinn, Cooperative Cyber Defense Centre of Excellence (CCD COE),2010.
David S. Wall. cybercrime: The transformation of crime in the information age, Polity press - Cambridge, 2007.
European Commission. Cyber security of 5G networks, Strasbourg, 26.03.2019.
European Commission. Cyber security Strategy of the European Union: An Open, Safe and Secure Cyberspace, Brussels, 2013.
European Union External Action Service “EU-NATO cooperation – Factsheet” (https://eeas.europa.eu/headquarters/headquarters-Homepage/28286/eu-natocooperation-factsheet_en).
Gustav Lindstrom, Thierry Tardy. The EU and NATO essential partners, European institute for security studies, Brussels, 2019.
Jaap de Hoop Scheffer. Strengthening the EU’s Cyber Defense Capabilities Report of a CEPS Task Force, Centre for European Policy Studies (CEPS), Brussels, November 2018.
James A. Lewis, The “Korean” Cyber Attacks and Their Implications for Cyber Conflict, Center for Strategic and International Studies CSIS, October 2009.
Jose Nazario, Politically Motivated Denial of Service Attacks, Arbor Networks, 2009.
Mathhew J. Sklerov, Solving the Dilemma of State Responses to Cyber attacks: A Justification for the Use of Active Defenses Against States Who Neglect Their Duty to Prevent, 201 Military Law Review, 2009.
National cyber strategy of USA, USA, September 2018.
National Initiative for Cyber security Careers and Studies, “NICE Cyber security Workforce Framework,” USA, 12 December 2017.
NATO Cooperative Cyber Defense Centre of Excellence, Tallinn Manuel Process.
Nick Hopkins. China “Targets NАТО Chief” in Faceboоk Spying Operation, Observer, 11 March 2012.
Nicolas Falliere, Liam O Murchu, Eric Chien. W32.Stuxnet Dossier, Symantec Corporation, USA, 2010.
Oliver Bullough. Russians Wage Cyber War on Chechen Websites, Reuters, 2002.
Operation Desert Storm: Evaluation of the Air Campaign, U.S. Government Accountability Office, Letter Report, GAO/NSIAD-97-134, 1997, Appendix V.
Steven Adair, Korean/US DDoS Attacks – Perplexing, Disruptive, and Destructive, 22. Shadow Server Founda¬tion Calendar blog, 10 July 2009.
Timothy L. Thomas, “Information Warfare in the Second Chechen War: Motivator for Military Reform?”, Foreign Military Studies Office, Fort Leavenworth, 2002.
Copyright (c) 2020 Annals of Disaster Risk Sciences
This work is licensed under a Creative Commons Attribution 4.0 International License.