Abstract :
Network technology use and cyberspace exploitation for intelligence and attack have become a normal part of military activity. Questions persist as to the appropriate framework for considering this new mode of conflict, but to a degree, these questions result from weak data, imprecise terminology, and a certain reluctance to abandon the notion that cyberconflict is unique, rather than just another mode of attack. This article reviews cyberattack in armed conflicts, thresholds for considering cyberexploits as the use of force, existing armed conflict laws´ applicability to cyberattack, and the political implications of cyberexploits´ strategic versus tactical applications.
Keywords :
legislation; military computing; security of data; armed conflict laws applicability; cyberspace exploitation; cyberwar effects; cyberwar thresholds; military activity; network technology; Computer crime; Cyberspace; Internet; Network security; Privacy; Cyberconflict; cyberattack; cyberwar; thresholds;