Sunday

Six Criteria for Evaluating Cyber Attacks as Armed Attacks


Michael N. Schmitt’s Six Criteria

The meaning of these criteria are as follows:

1. Severity looks at the scope and intensity of an attack. Analysis under this criterion examines the number of people killed, size of the area attacked, and amount of property damage done. The greater the damage, the more powerful the argument becomes for treating the cyber attack as an armed attack.

2. Immediacy looks at the duration of a cyber attack, as well as other timing factors. Analysis under this criterion examines the amount of time the cyber attack lasted and the duration of time that the effects were felt. The longer the duration and effects of an attack, the stronger the argument that it was an armed attack.

3. Directness looks at the harm caused. If the attack was the proximate cause of the harm, it strengthens the argument that the cyber attack was an armed attack. If the harm was caused in full or in part by other parallel attacks, the weaker the argument that the cyber attack was an armed attack.

4. Invasiveness looks at the locus of the attack. An invasive attack is one that physically crosses state borders, or electronically crosses borders and causes harm within the victim-state. The more invasive the cyber attack, the more it looks like an armed attack.

5. Measurability tries to quantify the damage done by the cyber attack. Quantifiable harm is generally treated more seriously in the international community. The more a state can quantify the harm done to it, the more the cyber attack looks like an armed attack. Speculative harm generally makes a weak case that a cyber attack was an armed attack.

6. Presumptive legitimacy focuses on state practice and the accepted norms of behavior in the international community. Actions may gain legitimacy under the law when the international community accepts certain behavior as legitimate. The less a cyber attack looks like accepted state practice, the stronger the argument that it is an illegal use of force or an armed attack.


See Schmitt, supra note 16, at 913–15; see also Wingfield, T. 2000. The Law of Information Conflict: National Security Law in Cyberspace. Ageis Research Corp. 124–27 (examining Schmitt’s use of force analysis).

No comments:

Post a Comment

Your comment is not allowed and automatically deleted by robots if:

1. You have no good things to say.
2. Your criticism is not based on facts and immaterial on the issues discussed.
3. Your facts or opinions are hearsays.
4. You hide in a veil of anonymity and you have no courage to reveal yourself.
5. Remember most people are are so opinionated about things, and they don't even know what they're talking about, or can't even do it themselves.

Disclosure | Disclaimer |Comments Policy |Terms of Use | Privacy Policy| Blog Sitemap

 

 

The information contained herein is provided as a public service with the understanding that this site makes no warranties, either expressed or implied, concerning the accuracy, completeness, reliability, or suitability of the information. Nor does warrant that the use of this information is free of any claims of copyright infringement. This site do not endorse any commercial providers or their products.

 

Rico BURAGA blog: To make random reflections on random subjects including the subject of randomness itself.

 

2005- 2014 All Rights Reserved. Rico BURAGA Blog

http://ricoburaga.blogspot.com

 

 

 

rico, buraga, rico buraga, philippines, metro manila, quezon city, emarketing specialist, e-marketing, specialist, consultant, digital marketing, marketing, online, internet, seo, online advertising, ethical hacking, web, analytics, blogger, blogging, business blogging, multi-channel, ushahidi, magento, moodle, apps, google apps, civicrm, website optimizer, negative campaigning, economics, price analysis, agricultural economics, feasibility study, project, project development, development management, international development, management, ict4d, crisis mapping, digital, social, media, social media, personal blog, networking, emarketing, cro, website usability, user experience, ux, conversion rate optimization, copywriting, optimization, conversion rate, outsource, outsourcing, freelance, digital marketing engineer, inbound marketing, demand generation, web analytics, google analytics, search engine, ubuntu, web copywriting, adwords, google adwords, certified, email marketing, uplb graduate, nagoya university graduate, gsid, idmg, uplb, wordpress, joomla, drupal, strategy, content, filipino, professional, google, microsoft, pay per click, search analytics, retargeting, e-commerce, autodidactic, bibliophile. ceh ver6., idpa shooter, shotokan karate, zen practitioner, project lead, united states of america, united states, new york, los angeles, england, united kingdom, canada, australia, ireland, south africa, new zealand, cebu, singapore, india, hong kong, puerto rico, nigeria, india, pakistan, russia, china, brazil, saudi arabia, japan, malaysia, germany, munich, dubai, italy, canberra, ghana, berlin, texas, dallas, arizona, boston, uae,  ricoburaga.com, ricoburaga.net mobile marketing association, web marketing association, american marketing association, direct marketing association, chartered institute of marketing