Six Criteria for Evaluating Cyber Attacks as Armed Attacks
Michael N. Schmitt’s Six Criteria
The meaning of these criteria are as follows:
1. Severitylooks at the scope and intensity of an attack. Analysis under this criterion examines the number of people killed, size of the area attacked, and amount of property damage done. The greater the damage, the more powerful the argument becomes for treating the cyber attack as an armed attack.
2. Immediacylooks at the duration of a cyber attack, as well as other timing factors. Analysis under this criterion examines the amount of time the cyber attack lasted and the duration of time that the effects were felt. The longer the duration and effects of an attack, the stronger the argument that it was an armed attack.
3. Directnesslooks at the harm caused. If the attack was the proximate cause of the harm, it strengthens the argument that the cyber attack was an armed attack. If the harm was caused in full or in part by other parallel attacks, the weaker the argument that the cyber attack was an armed attack.
4. Invasivenesslooks at the locus of the attack. An invasive attack is one that physically crosses state borders, or electronically crosses borders and causes harm within the victim-state. The more invasive the cyber attack, the more it looks like an armed attack.
5. Measurabilitytries to quantify the damage done by the cyber attack. Quantifiable harm is generally treated more seriously in the international community. The more a state can quantify the harm done to it, the more the cyber attack looks like an armed attack. Speculative harm generally makes a weak case that a cyber attack was an armed attack.
6. Presumptive legitimacyfocuses on state practice and the accepted norms of behavior in the international community. Actions may gain legitimacy under the law when the international community accepts certain behavior as legitimate. The less a cyber attack looks like accepted state practice, the stronger the argument that it is an illegal use of force or an armed attack.
See Schmitt, supra note 16, at 913–15; see also Wingfield, T. 2000. The Law of Information Conflict: National Security Law in Cyberspace. Ageis Research Corp. 124–27 (examining Schmitt’s use of force analysis).
No comments:
Post a Comment
Your comment is not allowed and automatically deleted by robots if:
1. You have no good things to say. 2. Your criticism is not based on facts and immaterial on the issues discussed. 3. Your facts or opinions are hearsays. 4. You hide in a veil of anonymity and you have no courage to reveal yourself. 5. Remember most people are are so opinionated about things, and they don't even know what they're talking about, or can't even do it themselves.
The
information contained herein is provided as a public service with the
understanding that this site makes no warranties, either expressed or implied,
concerning the accuracy, completeness, reliability, or suitability of the
information. Nor does warrant that the use of this information is free of any
claims of copyright infringement. This site do not endorse any commercial
providers or their products.
Rico BURAGA blog: To make random
reflections on random subjects including the subject of randomness itself.
2005- 2014 All Rights Reserved. Rico BURAGA Blog
http://ricoburaga.blogspot.com
rico, buraga, rico buraga, philippines, metro manila, quezon
city, emarketing specialist, e-marketing,
specialist, consultant, digital marketing, marketing, online, internet, seo,
online advertising, ethical hacking, web, analytics, blogger, blogging, business
blogging, multi-channel, ushahidi, magento, moodle, apps, google apps, civicrm,
website optimizer, negative campaigning, economics, price analysis, agricultural
economics, feasibility study, project, project development, development
management, international development, management, ict4d, crisis mapping,
digital, social, media, social media, personal blog, networking, emarketing, cro,
website usability, user experience, ux, conversion rate optimization,
copywriting, optimization, conversion rate, outsource,
outsourcing, freelance, digital marketing engineer, inbound marketing, demand
generation, web analytics, google analytics, search engine, ubuntu, web
copywriting, adwords, google adwords, certified,
email marketing, uplb graduate, nagoya university graduate, gsid, idmg, uplb,
wordpress, joomla, drupal, strategy, content, filipino, professional, google,
microsoft, pay per
click, search analytics, retargeting, e-commerce, autodidactic, bibliophile. ceh ver6., idpa
shooter, shotokan karate, zen practitioner, project lead, united states of
america, united states, new york, los angeles, england, united kingdom, canada,
australia, ireland, south africa, new zealand, cebu, singapore, india, hong kong,
puerto rico, nigeria, india, pakistan, russia, china, brazil, saudi arabia,
japan, malaysia, germany, munich, dubai, italy, canberra, ghana, berlin, texas,
dallas, arizona, boston, uae, ricoburaga.com, ricoburaga.net mobile
marketing association, web marketing association, american marketing
association, direct marketing association, chartered institute of marketing
No comments:
Post a Comment
Your comment is not allowed and automatically deleted by robots if:
1. You have no good things to say.
2. Your criticism is not based on facts and immaterial on the issues discussed.
3. Your facts or opinions are hearsays.
4. You hide in a veil of anonymity and you have no courage to reveal yourself.
5. Remember most people are are so opinionated about things, and they don't even know what they're talking about, or can't even do it themselves.