Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m8s7h Total loading time: 0 Render date: 2024-07-16T18:03:26.697Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  31 March 2020

Henning Lahmann
Affiliation:
Digital Society Institute, ESMT Berlin
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Unilateral Remedies to Cyber Operations
Self-Defence, Countermeasures, Necessity, and the Question of Attribution
, pp. 285 - 318
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Primary Sources

Secondary Sources

Ackerman, S, ‘Snowden: NSA Accidentally Caused Syria’s Internet Blackout in 2012’ Guardian (London, 13 August 2014) <www.theguardian.com/world/2014/aug/13/snowden-nsa-syria-internet-outage-civil-war>>Google Scholar
Agamben, G, State of Exception (2005)Google Scholar
Agius, M, ‘The Invocation of Necessity in International Law’ (2009) 56 Netherlands International Law Review 95Google Scholar
Ago, R, ‘Seventh Report on State Responsibility’ (International Law Commission 1978) A/CN4/307Google Scholar
Ago, R, ‘Eighth Report on State Responsibility’ (1980)Google Scholar
Ago, R, ‘Eighth Report on State Responsibility. Addendum: The Internationally Wrongful Act of the State, Source of International Responsibility (part I) (concluded)’ (United Nations 1980) A/CN4/318/ADD5-7Google Scholar
Albright, MK, ‘Enforcing International Law’ (1995) 89 Proceedings of the American Society of International Law 574CrossRefGoogle Scholar
Alexander, K, Responses to Advance Questions, Nomination of Lt Gen. Keith Alexander for Commander, US Cyber Command, US Senate Armed Service Committee 2010Google Scholar
Alexandrov, SA, Self-Defense against the Use of Force in International Law (1996)Google Scholar
Alland, D, ‘The Definition of Countermeasures’ in Crawford, James and others (eds), The Law of International Responsibility (2010) 1127Google Scholar
Allott, P, ‘State Responsibility and the Unmaking of International Law’ (1988) 29 Harvard International Law Journal 1Google Scholar
Amerasinghe, CE, Evidence in International Litigation (2005)Google Scholar
Appelbaum, J and others, ‘Kontrollierte EskalationDer Spiegel (Hamburg, 17 January 2015) <www.spiegel.de/spiegel/print/d-131355081.html>Google Scholar
Arangio-Ruiz, G, ‘Second Report on State Responsibility’ (International Law Commission 1989) A/CN4/425Google Scholar
Arimatsu, L, ‘A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations’ in Czosseck, C, Ottis, E, and Ziolkowski, K (eds), 2012 4th International Conference on Cyber Conflict – Proceedings (2012) 91Google Scholar
Arntz, J, Der Begriff der Friedensbedrohung in Satzung und Praxis der Vereinten Nationen (1975)Google Scholar
Arquilla, J, ‘The Great Cyberwar of 2002Wired (San Francisco, 10 July 2002) <www.wired.com/wired/archive/6.02/cyberwar_pr.html>Google Scholar
d’Aspremont, J, ‘Cyber Operations and International Law: An Interventionist Legal Thought’ (2016) ACIL Research Paper 2016-11 <http://ssrn.com/abstract=2765408>CrossRef>Google Scholar
Asthana, A and Mason, R, ‘Barack Obama: Brexit Would Put UK “Back of the Queue” for Trade TalksGuardian (London, 22 April 2016) <www.theguardian.com/politics/2016/apr/22/barack-obama-brexit-uk-back-of-queue-for-trade-talks>Google Scholar
Aston, JD, ‘Die Bekämpfung abstrakter Gefahren für den Weltfrieden durch legislative Maßnahmen des Sicherheitsrats – Resolution 1373 (2001) im Kontext’ (2002) 62 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 257Google Scholar
Aust, HP, ‘Through the Prism of Diversity: The Articles on State Responsibility in the Light of the ILC Fragmentation Report’ (2006) 49 German Yearbook of International Law 165Google Scholar
Baade, B, ‘Fake News and International Law’ (2019) 29 European Journal of International Law 1357Google Scholar
Bambauer, DE, ‘Conundrum’ (2011) 96 Minnesota Law Review 584Google Scholar
Bamford, J, ‘The Secret WarWired (San Francisco, 12 June 2013) <www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar>Google Scholar
Bamford, J, ‘The Most Wanted Man in the WorldWired (San Francisco, 22 August 2014) <www.wired.com/2014/08/edward-snowden/#ch-1>Google Scholar
Banks, WC, ‘The Bumpy Road to a Meaningful International Law of Cyber Attribution’ (2019) 113 AJIL Unbound 191Google Scholar
Baram, G and Sommer, U, ‘Covert or not Covert: National Strategies during Cyber Conflict’ in Minárik, T and others (eds), 2019 11th International Conference on Cyber Conflict (2019)Google Scholar
Barboza, J, ‘Necessity (Revisited) in International Law’ in Makarczyk, J (ed), Essays in International Law in Honour of Judge Manfred Lachs (1984) 27Google Scholar
Barkham, J, ‘Information Warfare and International Law on the Use of Force’ (2001) 34 New York University Journal of International Law & Politics 57Google Scholar
Barnes, B and Cieply, M, ‘Sony Drops “The Interview” following Terrorist ThreatsNew York Times (New York, 17 December 2014) <www.nytimes.com/2014/12/18/business/sony-the-interview-threats.html?_r=0&module=inline>Google Scholar
Barnes, J and Stoll, RJ, ‘Preemptive and Preventive War: A Preliminary Taxonomy’ (2007) The James A Baker III Institute for Public Policy <research.policyarchive.org/6810.pdf>>Google Scholar
Barnidge, RP Jr, ‘States’ Due Diligence Obligations with Regard to International Non-state Terrorist Organisations Post-11 September 2001: The Heavy Burden That States Must Bear’ (2005) 16 Irish Studies in International Affairs 103Google Scholar
Barnidge, RP, ‘The Due Diligence Principle under International Law’ (2006) 8 International Community Law Review 81CrossRefGoogle Scholar
Barsotti, R, ‘Armed Reprisals’ in Cassese, Antonio (ed), The Current Legal Regulation of the Use of Force (1986) 79Google Scholar
Baumgärtner, M and others, ‘Hacker mit DienstausweisDer Spiegel (Hamburg, 23 November 2017) 31Google Scholar
Baumgärtner, M and others, ‘Wer will die Verantwortung übernehmen, Unschuldige zu töten?Der Spiegel (Hamburg, 25 August 2018)Google Scholar
BBC, ‘On This Day: 1967: Supertanker Torrey Canyon Hits Rocks’ BBC News (16 March 1967) <http://news.bbc.co.uk/onthisday/hi/dates/stories/march/18/newsid_4242000/4242709.stm>>Google Scholar
BBC, ‘On This Day: 1967: Bombs Rain down on Torrey Canyon’ BBC News (29 March 1967) <http://news.bbc.co.uk/onthisday/hi/dates/stories/march/29/newsid_2819000/2819369.stm>>Google Scholar
Bederman, DJ, ‘Counterintuiting Countermeasures’ (2002) 96 American Journal of International Law 817CrossRefGoogle Scholar
Beitz, CR, ‘Justice and International Relations’ (1975) 4 Philosophy & Public Affairs 360, 387Google Scholar
Benatar, M, ‘The Use of Cyber Force: Need for Legal Justification?’ (2009) 1 Goettingen Journal of International Law 375Google Scholar
Ben-Naftali, O and others, ‘Illegal Occupation: Framing the Occupied Palestinian Territory’ (2005) 23 Berkeley Journal of International Law 551Google Scholar
Bennett, T, ‘Distributed Denial of Service Attacks’ (2000) <www.linuxsecurity.com/resource_files/intrusion_detection/ddos-whitepaper.html>>Google Scholar
Benzing, M, ‘Das Beweisrecht vor internationalen Gerichten und Schiedsgerichten in zwischenstaatlichen Streitigkeiten’ (2010)Google Scholar
Benzing, M, ‘Evidentiary Issues’ in Zimmermann, Andreas (ed), The Statute of the ICJ (2nd edn, 2012) 1234Google Scholar
Berman, I, ‘The Iranian Cyber Threat to the US Homeland. Statement before the US House of Representatives Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies and Subcommittee on Counterterrorism and Intelligence’ (26 April 2012) <http://homeland.house.gov/sites/homeland.house.gov/files/Testimony%20-%20Berman.pdf>>Google Scholar
Beuth, P and others, ‘Merkel and the Fancy BearDie Zeit (Hamburg, 12 May 2017) <www.zeit.de/digital/2017-05/cyberattack-bundestag-angela-merkel-fancy-bear-hacker-russia/komplettansicht>Google Scholar
Bianchi, A, ‘Enforcing International Law Norms against Terrorism: Achievements and Prospects’ in Andrea Bianchi (ed), Enforcing International Law Norms against Terrorism (2004) 491Google Scholar
Bijleveld, A, ‘We Have to Steer the Cyber Domain, before It Steers Us’ (2018) <https://puc.overheid.nl/mrt/doc/PUC_248137_11/1>>Google Scholar
Bill, BJ, ‘The Rendulic “Rule”: Military Necessity, Commander’s Knowledge, and Methods of Warfare’ (2009) 12 Yearbook of International Humanitarian Law 119Google Scholar
Biller, J and Schmitt, MN, ‘Un-caging the Bear? A Case Study in Cyber Opinio Juris and Unintended Consequences’ (2018) EJIL Talk <www.ejiltalk.org/un-caging-the-bear-a-case-study-in-cyber-opinio-juris-and-unintended-consequences>>Google Scholar
Binder, C, ‘Nichterfüllung Völkerrechtlicher Vertragspflichten wegen Notstands. Der Notstand im Völkergewohnheitsrecht und in besonderen Vertragsbestimmungen’ in Stephan Wittich, August Reinisch, and Andrea Gattini (eds), Kosovo – Staatsschulden – Notstand – EU-Reformvertrag – Humanitätsrecht. Beiträge zum 33. Österreichischen Völkerrechtstag 2008 in Conegliano (2008) 119Google Scholar
Binder, C, ‘Non Performance of Treaty Obligations in Cases of Necessity: From “Necessity Knows No Law” via the “Law(s) of Necessity” to Interfaces between Different “Laws of Necessity”’ (2008) 13 Austrian Review of International and European Law 3Google Scholar
Bing, C and Lynch, SN, ‘U.S. Charges North Korean Hacker in Sony, WannaCry Cyberattacks’ (Reuters, 6 September 2018) <www.reuters.com/article/us-cyber-northkorea-sony/u-s-charges-north-korean-hacker-in-sony-wannacry-cyberattacks-idUSKCN1LM20W>>Google Scholar
Bjorklund, AK, ‘Emergency Exceptions: State of Necessity and Force Majeure’ in Peter Muchlinski, Federico Ortino, and Christoph Schreuer (eds), The Oxford Handbook of International Investment Law (2008) 459Google Scholar
Boed, R, ‘State of Necessity as a Justification for Internationally Wrongful Conduct’ (2000) 1 Yale Human Rights & Development Law Journal 1Google Scholar
Bolton, J, ‘Overthrowing Saddam Hussein Was the Right Move for the US and Its AlliesGuardian (London, 26 February 2013) <www.theguardian.com/commentisfree/2013/feb/26/iraq-war-was-justified?commentpage=1>Google Scholar
Boon, K, ‘The UN Security Council Takes up Ebola’ (2014) Opinio Juris <http://opiniojuris.org/2014/09/18/un-security-council-takes-ebola>>Google Scholar
Borelli, S and Olleson, S, ‘Obligations Relating to Human Rights and Humanitarian Law’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 1177Google Scholar
Borgen, CJ, ‘The Language of Law and the Practice of Politics: Great Powers and the Rhetoric of Self-Determination in the Cases of Kosovo and South Ossetia’ (2009) 10 Chicago Journal of International Law 1Google Scholar
Borgen, CJ, ‘The Crimea, Compliance, and the Constraint of International Law’ Opinio Juris (3 March 2014) <http://opiniojuris.org/2014/03/03/crimea-compliance-constraint-international-law>>Google Scholar
Borger, J, ‘As France Becomes Latest Target, Are Election Hacks the New Normal?Guardian (London, 6 May 2017) <www.theguardian.com/world/2017/may/05/french-election-hack-emmanuel-macron>Google Scholar
Bork, R, Allgemeiner Teil des Bürgerlichen Gesetzbuchs (3rd edn, 2011)Google Scholar
Bothe, M, ‘Terrorism and the Legality of Pre-emptive Force’ (2003) 14 European Journal of International Law 227Google Scholar
Bothe, M, ‘Oil Platforms Case’ in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Bradner, E, ‘Obama: North Korea’s Hack Not War, but “Cybervandalism”’ (CNN Online, 24 December 2014) <http://edition.cnn.com/2014/12/21/politics/obama-north-koreas-hack-not-war-but-cyber-vandalism>>Google Scholar
Brenner, SW, ‘“At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare’ (2007) 97 Journal of Criminal Law & Criminology 379Google Scholar
Brewster, T, ‘An NSA Cyber Weapon Might be behind a Massive Global Ransomware OutbreakForbes (Jersey City, 12 May 2017) <www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/#18cc790ae599>Google Scholar
Brown, D, ‘A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict’ (2006) 47 Harvard International Law Journal 179Google Scholar
Brown, GD and Tullos, OW, ‘On the Spectrum of Cyberspace Operations’ Small Wars Journal (11 December 2012) <http://smallwarsjournal.com/print/13595>>Google Scholar
Brownlie, I, ‘International Law and the Activities of Armed Bands’ (1958) 7 International and Comparative Law Quarterly 712Google Scholar
Brownlie, I, International Law and the Use of Force by States (1963)Google Scholar
Brownlie, I, Principles of Public International Law (7th edn, 2008)Google Scholar
Brunée, J, ‘The Kyoto Protocol: Testing Ground for Compliance Theories?’ (2003) 63 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 255Google Scholar
Buffard, I and Wittich, S, ‘United States Diplomatic and Consular Staff in Tehran Case (United States of America v Iran)’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Bumgarner, J and Borg, S, ‘Overview by the US-CCU of the Cyber Campaign against Georgia in August of 2008’ (2009) <www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf>>Google Scholar
Burke-White, WW and von Staden, A, ‘Investment Protection in Extraordinary Times: The Interpretation and Application of Non-precluded Measures Provisions in Bilateral Investment Treaties’ (2008) 48 Virginia Journal of International Law 307Google Scholar
Calamita, NJ, ‘Sanctions, Countermeasures, and the Iranian Nuclear Issue’ (2009) 42 Vanderbilt Journal of Transnational Law 1393Google Scholar
Calamita, NJ, ‘Countermeasures and Jurisdiction: Between Effectiveness and Fragmentation’ (2011) 42 Georgetown Journal of International Law 233Google Scholar
Caltagirone, SP and Frincke, D, ‘ADAM: Active Defense Algorithm and Model’ in Wyler, NR and Byrne, G (eds), Aggressive Network Self-Defense (2005) 287Google Scholar
Caltagirone, SP and Frincke, D, ‘ADAM: Active Defense Algorithm and Model’ in Wyler, NR and Byrne, G ‘The Response Continuum’, Proceedings of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY (2005)Google Scholar
Calvo, A, ‘Cyberwar Is War: A Critique of “Hacking Can Reduce Real-World Violence”’ (2014) Small Wars Journal <http://smallwarsjournal.com/jrnl/art/cyberwar-is-war>>Google Scholar
Cannizzaro, E, ‘The Role of Proportionality in the Law of International Countermeasures’ (2001) 12 European Journal of International Law 889Google Scholar
Caplan, LM, ‘State Immunity, Human Rights, and Jus Cogens: A Critique of the Normative Hierarchy Theory’ (2003) 97 American Journal of International Law 741CrossRefGoogle Scholar
Carr, J, Inside Cyberwarfare (2nd edn, 2012)Google Scholar
Carr, J ‘Who’s Responsible for the Saudi Aramco Network Attack?’ (Infosec Island, 2012) <www.infosecisland.com/blogview/22290-Whos-Responsible-for-the-Saudi-Aramco-Network-Attack.html>>Google Scholar
Carr, J ‘Mandiant APT1 Report has Critical Analytic Flaws’ (Digital Dao, 2013) <http://jeffreycarr.blogspot.de/2013/02/mandiant-apt1-report-has-critical.html>>Google Scholar
Cassese, A, ‘A Judicial MassacreGuardian (London, 27 February 2007) <www.theguardian.com/commentisfree/2007/feb/27/thejudicialmassacreofsrebr>Google Scholar
Cassese, A, ‘The Nicaragua and Tadić Tests Revisited in Light of the ICJ Judgment on Genocide in Bosnia’ (2007) 18 European Journal of International Law 649Google Scholar
Chaikin, D, ‘Network Investigation of Cyberattacks: The Limits of Digital Evidence’ (2006) 46 Crime, Law & Social Change 239Google Scholar
Chandler, JA, ‘Security in Cyberspace: Combatting Distributed Denial of Service Attacks’ (2004) 1 University of Ottawa Law & Technology Journal 231Google Scholar
Charney, S, Rethinking the Cyber Threat: A Framework and Path Forward (2009) <www.microsoft.com/download/en/details.aspx?id=747>>Google Scholar
Chen, LC, An Introduction to Contemporary International Law: A Policy-Oriented Perspective (1989)Google Scholar
Chesney, R, ‘Hackback Is Back: Assessing the Active Cyber Defense Certainty Act’ (Lawfare, 2019) <www.lawfareblog.com/hackback-back-assessing-active-cyber-defense-certainty-act>>Google Scholar
Chesterman, S, ‘Secret Intelligence’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Chinkin, C, ‘Jus Cogens, Article 103 of the UN Charter and Other Hierarchical Techniques of Conflict Solution’ (2006) 17 Finnish Yearbook of International Law 63Google Scholar
Chong, J, ‘Bad Code: Should Software Makers Pay? Part 1’ (New Republic, 3 October 2013) <https://newrepublic.com/article/114973/bad-code-should-software-makers-pay-part-1>>Google Scholar
Christakis, T, ‘Intervention and Self-Help’ in Bannelier, K, Christakis, T, and Heathcote, S (eds), The ICJ and the Evolution of International Law: The Enduring Impact of the Corfu Channel Case (2012) 211Google Scholar
Christie, GC, ‘The Defense of Necessity Considered from the Legal and Moral Points of View’ (1999) 48 Duke Law Journal 975Google Scholar
Cirincione, J and others, ‘WMD in Iraq: Evidence and Implications’ (Carnegie Endowment for International Peace 2004)Google Scholar
Clapper, JR, ‘Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence’ (2012) <www.intelligence.senate.gov/120131/clapper.pdf>>Google Scholar
Clark, DD and Landau, S, ‘Untangling Attribution’ (2011) 2 Harvard National Security Journal 323Google Scholar
Clearwater, S, ‘Holding States Accountable for the Crime of Crimes: An Analysis of Direct State Responsibility for Genocide in Light of the ICJ’s 2007 Decision in Bosnia v Serbia’ (2009) 15 Auckland University Law Review 1Google Scholar
Condorello, L and Kreß, C, ‘The Rules of Attribution: General Considerations’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 221Google Scholar
Condron, SM, ‘Getting It Right: Protecting American Critical Infrastructure in Cyberspace’ (2007) 20 Harvard Journal of Law & Technology <http://jolt.law.harvard.edu/articles/pdf/v20/20HarvJLTech403.pdf>Google Scholar
Corten, O, ‘L’état de Nécessité Peut-Il Justifier Un Recours À La Force Non Constitutif D’agression?’ (2004) 4 Global Community Yearbook of International Law & Jurisprudence 11Google Scholar
Corten, O, The Law against War (2010)Google Scholar
Corten, O, ‘Judge Simma’s Separate Opinion in the Oil Platforms Case: To What Extent Are Armed “Proportionate Defensive Measures” Admissible in Contemporary International Law?’ in Fastenrath, U and others (eds), From Bilateralism to Community Interest: Essays in Honour of Judge Bruno Simma (2011) 843Google Scholar
Couzigou, I, ‘The Challenges Posed by Cyberattacks to the Law on Self-Defence’ (2014) European Society of International Law, 10th Anniversary ConferenceGoogle Scholar
Crawford, J, ‘Revising the Draft Articles on State Responsibility’ (1999) 10 European Journal of International Law 435Google Scholar
Crawford, J, ‘Second Report on State Responsibility’ (International Law Commission, 1999) A/CN4/498Google Scholar
Crawford, J, ‘Second Report on State Responsibility – Addendum 2’ (International Law Commission, 1999) A/CN4/498/Add2Google Scholar
Crawford, J, ‘Third Report on State Responsibility’ (International Law Commission, 2000) A/CN4/507Google Scholar
Crawford, J, ‘Third Report on State Responsibility – Addendum 3’ (International Law Commission, 2000) A/CN4/507/Add3Google Scholar
Crawford, J, ‘Fourth Report on State Responsibility’ (International Law Commission, 2001) A/CN4/517Google Scholar
Crawford, J, ‘Fourth Report on State Responsibility – Addendum’ (International Law Commission, 2001) A/CN4/517/Add1Google Scholar
Crawford, J, ‘The ILC’s Articles on Responsibility of States for Internationally Wrongful Acts: A Retrospect’ (2002) 96 American Journal of International Law 874Google Scholar
Crawford, J, ‘The International Law Commission’s Articles on State Responsibility: Introduction’ in The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries (2002) 1Google Scholar
Crawford, J, ‘State Responsibility’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Crawford, J and Olleson, S, ‘The Nature and Forms of International Responsibility’ in Evans, MD (ed), International Law (3rd edn, 2010) 441Google Scholar
Crayford, JV, ‘Forthcoming Changes to the International Convention for the Prevention of Pollution from Ships (MARPOL 73/78)’ in Nordquist, MH and Moore, JN (eds), Current Maritime Issues and the International Maritime Organization (1999) 133Google Scholar
Crimm, NJ, ‘Post-September 11 Fortified Anti-Terrorism Measures Compel Heightened Due Diligence’ (2005) 25 Pace Law Review 203Google Scholar
Czosseck, C, Klein, G, and Leder, F, ‘On the Arms Race around Botnets: Setting up and Taking down Botnets’ in Czosseck, C, Tyugu, E, and Wingfield, T (eds), 2011 3rd International Conference on Cyber Conflict – Proceedings (2011) 107 <www.ccdcoe.org/publications/2011proceedings/2011_Proceedings.pdf>>Google Scholar
Dainotti, A and others, ‘Analysis of Country-Wide Internet Outages Caused by Censorship’ (2011) <www.caida.org/publications/papers/2011/outages_censorship/outages_censorship.pdf>>Google Scholar
Damrosch, LF, ‘Retaliation or Arbitration – or Both? The 1978 United States–France Aviation Dispute’ (1980) 74 American Journal of International Law 785Google Scholar
Damrosch, LF, ‘Enforcing International Law through Non-forcible Measures’ (1997) 269 Recueil Des Cours 19Google Scholar
D’Argent, P, ‘Reparation and Compliance’ in Bannelier, K, Christakis, T, and Heathcote, S (eds), The ICJ and the Evolution of International Law: The Enduring Impact of the Corfu Channel Case (2012) 335Google Scholar
Davis, J, ‘Hackers Take down the Most Wired Country in EuropeWired (San Francisco, 21 August 2007) <www.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all>Google Scholar
Deeks, AS, ‘“Unwilling or Unable”: Toward a Normative Framework for Extraterritorial Self-Defense’ (2012) 52 Virginia Journal of International Law 483Google Scholar
De Hoogh, AJJ, ‘Article 4 and 8 of the 2001 ILC Articles on State Responsibility, the Tadić Case and Attribution of Acts of Bosnian Serb Authorities to the Federal Republic of Yugoslavia’ (2002) 72 British Yearbook of International Law 255CrossRefGoogle Scholar
de Jong-Chen, J and O’Brien, B, A Comparative Study: The Approach to Critical Infrastructure Protection in the US, E.U., and China (2017)Google Scholar
De La Fayette, L, ‘ITLOS and the Saga of the Saiga: Peaceful Settlement of a Law of the Sea Dispute’ (2000) 15 International Journal of Marine and Coastal Law 355Google Scholar
Del Mar, K, ‘The ICJ and Standards of Proof’ in Bannelier, K, Christakis, T, and Heathcote, S (eds), The ICJ and the Evolution of International Law: The Enduring Impact of the Corfu Channel Case (2012) 98Google Scholar
Demarest, GB, ‘Espionage in International Law’ (1996) 24 Denver Journal of International Law & Policy 321Google Scholar
Desierto, DA, Necessity and National Emergency Clauses: Sovereignty in Modern Treaty Interpretation (2012)CrossRefGoogle Scholar
de Wilde, M, ‘The State of Emergency in the Weimar Republic: Legal Disputes over Article 48 of the Weimar Constitution’ (2010) 78 Tijdschrift voor Rechtsgeschiedenis 135Google Scholar
Diehl, J and Reinbold, F, ‘Wenn der Staat zum Hacker wirdSpiegel Online (Hamburg, 10 December 2017) <www.spiegel.de/netzwelt/netzpolitik/hackback-wenn-der-staat-zum-hacker-werden-will-a-1179423.html>Google Scholar
Diggelmann, O, ‘Fault in the Law of State Responsibility: Pragmatism Ad Infinitum?’ (2006) 49 German Yearbook of International Law 293Google Scholar
Dinstein, Y, ‘Computer Network Attacks and Self-Defense’ in Schmitt, MN and O’Donnell, BT (eds), Computer Network Attack and International Law (2002) 7699Google Scholar
Dinstein, Y, War, Aggression and Self-Defence (5th edn, 2012)Google Scholar
Dittmar, F, Angriffe Auf Computernetzwerke: Ius Ad Bellum Und Ius in Bello (2005)Google Scholar
Dittrich, D and Himma, KE, ‘Active Response to Computer Intrusions’ in Bidgoli, H (ed), The Handbook of Information Security (2005) 664Google Scholar
Diurni, A, ‘Schädigende Nothilfe: Haftungszurechnung im Europäischen Privatrecht’ (2006) Zeitschrift für Europäisches Privatrecht 583Google Scholar
Dörr, O, ‘Use of Force, Prohibition of’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Drumbl, MA, ‘Trail Smelter and the International Law Commission’s Work on State Responsibility for Internationally Wrongful Acts and State Liability’ in Bratspies, RM and Miller, RA (eds), Transboundary Harm in International Law: Lessons from the Trail Smelter Arbitration (2006) 85Google Scholar
Dupont, PE, ‘Countermeasures and Collective Security: The Case of the EU Sanctions against Iran’ (2012) 17 Journal of Conflict and Security Law 301Google Scholar
Dupuy, PM and Hoss, C, ‘Trail Smelter and Terrorism: International Mechanisms to Combat Transboundary Harm’ in Bratspies, RM and Miller, RA (eds), Transboundary Harm in International Law: Lessons from the Trail Smelter Arbitration (2006) 225Google Scholar
Dyzenhaus, D, ‘Schmitt v. Dicey: Are States of Emergency Inside or Outside the Legal Order?’ (2006) 27 Cardozo Law Review 2005Google Scholar
Dzidzornu, DM and Tsamenyi, BM, ‘Enhancing International Control of Vessel-Source Oil Pollution under the Law of the Sea Convention, 1982: A Reassessment’ (1991) 10 University of Tasmania Law Review 269Google Scholar
Egloff, FJ and Wenger, A, ‘Public Attribution of Cyber IncidentsCSS Analyses in Security Policy (Zurich, 2019)Google Scholar
Elagab, OY, The Legality of Non-forcible Counter-Measures in International Law (1988)Google Scholar
Emanuelli, CC, ‘The Right of Intervention of Coastal States on the High Seas in Cases of Pollution Casualties’ (1976) 25 UNB Law Journal 79Google Scholar
Ernst, N, ‘Digitale Selbstschussanlage der NSA Gegen DDoS-Attacken’ (Golem.de, 13 January 2015) <www.golem.de/news/snowden-unterlagen-digitale-selbstschussanlage-der-nsa-gegen-ddos-attacken-1501-111648.html>>Google Scholar
Evron, G, ‘Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Internet War’ (2008) 9 Georgetown Journal of International Affairs 121Google Scholar
Falk, RA, ‘The Beirut Raid and the International Law of Retaliation’ (1969) 63 American Journal of International Law 415Google Scholar
Falliere, N, O’Murchu, L, and Chien, E, ‘W32.Stuxnet Dossier’ (Symantec, 2011) <www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf>>Google Scholar
Feder, NM, ‘Reading the U.N. Charter Connotatively: Toward a New Definition of Armed Attack’ (1987) 19 New York University Journal of International Law & Politics 395Google Scholar
Finlay, L and Payne, C, ‘The Attribution Problem and Cyber Armed Attacks’ (2019) AJIL Unbound 202Google Scholar
Fischerkeller, MP and Harknett, RJ, ‘A Response on Persistent Engagement and Agreed Competition’ (Lawfare, 2019) <www.lawfareblog.com/response-persistent-engagement-and-agreed-competition>>Google Scholar
Fitzmaurice, GG, ‘Arbitration between Portugal and Germany concerning War Damage Committed Prior to Portugal’s Entry into the War’ (1932) 13 British Yearbook of International Law 156Google Scholar
Fitzmaurice, M, ‘Necessity in International Environmental Law’ (2010) 41 Netherlands Yearbook of International Law 159Google Scholar
Fleck, D, ‘Individual and State Responsibility for Intelligence Gathering’ (2007) 28 Michigan Journal of International Law 687Google Scholar
Follath, E and Stark, H, ‘The Story of “Operation Orchard”: How Israel Destroyed Syria’s Al Kibar Nuclear ReactorDer Spiegel (Hamburg, 2 November 2009) <www.spiegel.de/international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-al-kibar-nuclear-reactor-a-658663.html>Google Scholar
Forbrig, J, ‘Russian Hackers Can’t Beat German Democracy’ (Foreign Policy, 3 August 2017) <https://foreignpolicy.com/2017/08/03/russian-hackers-cant-beat-german-democracy-putin-merkel>>Google Scholar
Forteau, M, ‘Reparation in the Event of a Circumstance Precluding Wrongfulness’ in Crawford, James and others (eds), The Law of International Responsibility (2010) 887Google Scholar
Foster, C, ‘Necessity and Precaution in International Law: Responding to Oblique Forms of Urgency’ (2008) 23 New Zealand Universities Law Review 265Google Scholar
Foster, C, Science and the Precautionary Principle in International Courts and Tribunals (2011)Google Scholar
Franck, TM, Recourse to Force: State Action against Threats and Armed Attacks (2002)Google Scholar
Franck, TM, ‘Reflections on Force and Evidence’ (2006) 100 Proceedings of the American Society of International Law 51Google Scholar
Franck, TM, ‘On Proportionality of Countermeasures in International Law’ (2008) 102 American Journal of International Law 715Google Scholar
Freestone, D and Hey, E, The Precautionary Principle and International Law: The Challenge of Implementation (1996)Google Scholar
Gallagher, S, ‘Eternally Blue: Baltimore City Leaders Blame NSA for Ransomware Attack’ (Ars Technica, 28 May 2019) <https://arstechnica.com/information-technology/2019/05/eternally-blue-baltimore-city-leaders-blame-nsa-for-ransomware-attack>>Google Scholar
Gartzke, E, ‘The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth’ (2013) 38 International Security 41Google Scholar
Garwood-Gowers, A, ‘Israel’s Airstrike on Syria’s Al-Kibar Facility: A Test Case for the Doctrine of Pre-emptive Self-Defence?’ (2011) 16 Journal of Conflict & Security Law 263Google Scholar
Gattini, A, ‘La Notion de Faute a La Lumière Du Projet de Convention de La Commission Du Droit International Sur La Responsabilité Internationale’ (1992) 3 European Journal of International Law 253Google Scholar
Gattini, A, ‘Smoking/No Smoking: Some Remarks on the Current Place of Fault in the ILC Draft Articles on State Responsibility’ (1999) 10 European Journal of International Law 397Google Scholar
Gattini, A, ‘Breach of the Obligation to Prevent and Reparation Thereof in the ICJ’s Genocide Judgment’ (2007) 18 European Journal of International Law 695Google Scholar
Gattini, A, ‘Evidentiary Issues in the ICJ’s Genocide Judgment’ (2007) 5 Journal of International Criminal Justice 889Google Scholar
Gaycken, S, ‘The Necessity of (Some) Certainty: A Critical Remark concerning Matthew Sklerov’s Concept of “Active Defense”’ (2010) 12 Journal of Military and Strategic Studies 1Google Scholar
Gaycken, S, ‘Krieg der Rechner’ (2011) Internationale Politik 88Google Scholar
Gaycken, S, Cyberwar: Das Wettrüsten hat längst begonnen. Vom digitalen Angriff zum realen Ausnahmezustand (2012)Google Scholar
Gazzini, T, The Changing Rules on the Use of Force in International Law (2005)Google Scholar
Gazzini, T and others, ‘Necessity across International Law: An Introduction’ (2010) 41 Netherlands Yearbook of International Law 3Google Scholar
Geiß, R and Lahmann, H, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses towards Non-forcible Countermeasures and Collective Threat-Prevention’ in Ziolkowski, K (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (2013) 621Google Scholar
Giles, K, ‘Russia’s Public Stance on Cyberspace Issues’ in Czosseck, C, Ottis, R, and Zielkowski, K (eds), 2012 4th International Conference on Cyber Conflict – Proceedings (2012) 63Google Scholar
Giorgio, EJ, ‘Planning for the Future of Cyberattack Attribution’ (US House of Representatives Committee on Science and Technology, 2010)Google Scholar
Glennon, MJ, ‘The Road Ahead: Gaps, Leaks and Drips’ (2013) 89 International Law Studies 362Google Scholar
Goldsmith, J, ‘A Modest Defense of the Government’s Legal and Policy Confusion Re Sony’ (Lawfare, 23 December 2014) <www.lawfareblog.com/2014/12/a-modest-defense-of-the-governments-legal-and-policy-confusion-re-sony>>Google Scholar
Goldsmith, J and Levinson, D, ‘Law for States: International Law, Constitutional Law, Public Law’ (2009) 122 Harvard Law Review 1791Google Scholar
Gorman, S and Barnes, JE, ‘Iran Blamed for CyberattacksWall Street Journal (New York, 12 October 2012) <http://online.wsj.com/article/SB10000872396390444657804578052931555576700.html>Google Scholar
Gorman, S and Yadron, D, ‘Iran Hacks Energy Firms, US SaysWall Street Journal (New York, 24 May 2013) A4Google Scholar
Graham, DE, ‘Cyber Threats and the Law of War’ (2010) 4 Journal of National Security Law & Policy 87Google Scholar
Gray, CD, Judicial Remedies in International Law (1987)Google Scholar
Gray, CD, International Law and the Use of Force (3rd edn, 2008)Google Scholar
Gray, CD, ‘The Different Forms of Reparation: Restitution’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 589Google Scholar
Green, JA, ‘Docking the Caroline: Understanding the Relevance of the Formula in Contemporary Customary International Law concerning Self-Defence’ (2006) 14 Cardozo Journal of International & Comparative Law 429Google Scholar
Green, JA, The ICJ and Self-Defence in International Law (2009)Google Scholar
Green, JA, ‘Fluctuating Evidentary Standards for Self-Defence in the ICJ’ (2009) 58 International and Comparative Law Quarterly 163Google Scholar
Green, JA, ‘Questioning the Peremptory Status of the Prohibition of the Use of Force’ (2011) 32 Michigan Journal of International Law 215Google Scholar
Greenawalt, K, ‘The Perplexing Borders of Justification and Excuse’ (1984) 84 Columbia Law Review 1897Google Scholar
Greenberg, A, ‘“Crash Override”: The Malware That Took down a Power GridWired (San Francisco, 12 June 2017) <www.wired.com/story/crash-override-malware>Google Scholar
Greenberg, A, ‘The Untold Story of NotPetya, the Most Devastating Cyberattack in HistoryWired (San Francisco, 22 August 2018) <www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world>Google Scholar
Greenwald, G, ‘Obama Orders US to Draw up Overseas Target List for Cyber-AttacksGuardian (London, 7 June 2013) <www.guardian.co.uk/world/2013/jun/07/obama-china-targets-cyber-overseas>Google Scholar
Greenwood, C, ‘Self-Defence’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Griebel, J and Plücken, M, ‘Hague International Tribunals: ICJ – New Developments Regarding the Rules of Attribution? The ICJ’s Decision in Bosnia v. Serbia’ (2008) 21 Leiden Journal of International Law 601Google Scholar
Grindal, K and others., ‘Is It Time to Institutionalize Cyber-Attribution?’ (2018) Internet Governance Project White Paper <www.internetgovernance.org/wp-content/uploads/WhitePaper-Attribution-Final-PDF.pdf>>Google Scholar
Groll, E, ‘Cyberattack Targets Safety System at Saudi Aramco’ (Foreign Policy, 21 December 2017) <https://foreignpolicy.com/2017/12/21/cyber-attack-targets-safety-system-at-saudi-aramco>>Google Scholar
Gross, E, ‘Use of Civilians as Human Shields: What Legal and Moral Restrictions Pertain to a War Waged by a Democratic State against Terrorism?’ (2002) 16 Emory International Law Review 445Google Scholar
Grosswald, L, ‘Cyberattack Attribution Matters under Article 51 of the U.N. Charter’ (2011) 36 Brooklyn Journal of International Law 1151Google Scholar
Hack, G, ‘Das Internet Als Militärisches System’ (2015) 69 Merkur 81Google Scholar
Haddick, R, ‘This Week at War: Lessons from Cyberwar I’ (Foreign Policy, 28 January 2011) <http://foreignpolicy.com/2011/01/28/this-week-at-war-lessons-from-cyberwar-i>>Google Scholar
Haferkamp, H-P, ‘Ausübung der Rechte, Selbstverteidigung, Selbsthilfe’ in Schmoeckel, M, Rückert, J, and Zimmermann, R (eds), Historisch-kritischer Kommentar zum BGB, Band I: Allgemeiner Teil (2003) §§ 226–231Google Scholar
Hahn, MJ, ‘Vital Interests and the Law of GATT: An Analysis of GATT’s Security Exception’ (1991) 12 Michigan Journal of International Law 558Google Scholar
Hailbronner, K and Heilmann, D, ‘Aerial Incident Cases before International Courts and Tribuals’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Halloran, R, ‘The Downing of Flight 655: US Downs Iran Airliner Mistaken for F-14; 290 Reported Dead; A Tragedy, Reagan Says; Action Is DefendedNew York Times (New York, 4 July 1988) <www.nytimes.com/1988/07/04/world/downing-flight-655-us-downs-iran-airliner-mistaken-for-f-14-290-reported-dead.html>Google Scholar
Hathaway, OA and others, ‘The Law of Cyber-Attack’ (2012) 100 California Law Review 817Google Scholar
Newman, L Hay, ‘The Iran Hacks Cybersecurity Experts Feared May be HereWired (San Francisco, 18 December 2018) <www.wired.com/story/iran-hacks-nuclear-deal-shamoon-charming-kitten>Google Scholar
Heathcote, S, ‘Circumstances Precluding Wrongfulness in the ILC Articles on State Responsibility: Necessity’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 491Google Scholar
Heathcote, S, ‘Circumstances Precluding Wrongfulness in the ILC Articles on State Responsibility: Necessity’ in Crawford, J ‘State Omissions and Due Diligence: Aspects of Fault, Damage and Contribution to Injury in the Law of State Responsibility’ in Bannelier, K, Christakis, T, and Heathcote, S (eds), The ICJ and the Evolution of International Law: The Enduring Impact of the Corfu Channel Case (2012) 295Google Scholar
Heintschel von Heinegg, W, ‘Blockade’ in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Heintschel von Heinegg, W, ‘Die völkerrechtlichen Verträge als Hauptrechtsquelle des Völkerrechts’ in Ipsen, K (ed), Völkerrecht (6th edn, 2014) 390Google Scholar
Heintschel von Heinegg, W and Epping, V, ‘Friedenssicherung und friedliche Streitbeilegung’ in Ipsen, K (ed), Völkerrecht (6th edn, 2014) 1055Google Scholar
Henckaerts, J-M and Doswald-Beck, L, Customary International Humanitarian Law, vol I: Rules (2005)Google Scholar
Henkin, L, How Nations Behave (2nd edn, 1979)Google Scholar
Henriksen, A, ‘Jus Ad Bellum and American Targeted Use of Force to Fight Terrorism around the World’ (2014) 19 Journal of Conflict & Security Law 211Google Scholar
Henriksen, A, ‘The End of the Road for the UN GGE Process: The Future of Regulation of Cyberspace’ (2019) 5 Journal of Cybersecurity 1Google Scholar
Herpig, S, ‘Governmental Vulnerability Assessment and Management’ (SNV, 2018) <www.stiftung-nv.de/sites/default/files/vulnerability_management.pdf> 18+18>Google Scholar
Hessbruegge, JA, ‘The Historical Development of the Doctrines of Attribution and Due Diligence in International Law’ (2004) 36 New York University Journal of International Law & Politics 265Google Scholar
Hinck, G and Maurer, T, ‘What’s the Point of Charging Foreign State-Linked Hackers?’ (Lawfare, 2019) <www.lawfareblog.com/whats-point-charging-foreign-state-linked-hackers>>Google Scholar
Hinkle, KC, ‘Countermeasures in the Cyber Context: One More Thing to Worry About’ (2011) 37 Yale Journal of International Law Online 11Google Scholar
Hitchens, T, Lewis, JA, and Neuneck, G, ‘Foreword & Introduction’ in United Nations Institute for Disarmament Research (ed), The Cyber Index: International Security Trends and Reality (2013)Google Scholar
Hobbes, T, Leviathan (1935)Google Scholar
Hoisington, M, ‘Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense’ (2009) 32 Boston College International & Comparative Law Review 439Google Scholar
Hollis, DB, ‘Why States Need an International Law for Information Operations’ (2007) 11 Lewis & Clark Law Review 1023Google Scholar
Hollis, DB, ‘An E-SOS for Cyberspace’ (2011) 52 Harvard International Law Journal 373Google Scholar
Hollis, DB, ‘Re-thinking the Boundaries of Law in Cyberspace: A Duty to Hack?’ in Ohlin, JD, Govern, K, and Finkelstein, C (eds), Cyberwar: Law & Ethics for Virtual Conflicts (2015) 129Google Scholar
Hopkins, N, ‘Computer Worm that Hit Iran Oil Terminals “Is Most Complex Yet”Guardian (London, 28 May 2012) <www.theguardian.com/world/2012/may/28/computer-worm-iran-oil-w32flamer>Google Scholar
Hoss, C, ‘Satisfaction’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Hoyer, W, ‘Opening Speech of the Conference: Challenges in Cybersecurity – Risks, Strategies, and Confidence-Building’ (2011) <www.auswaertiges-amt.de/DE/Infoservice/Presse/Reden/2011/111213-StM_H_Cybersecurity.html>>Google Scholar
Hunker, J, ‘US International Policy for Cybersecurity: Five Issues That Won’t Go Away’ (2010) 4 Journal of National Security Law & Policy 197Google Scholar
Hunker, J, Hutchinson, R, and Margulies, J, ‘Attribution of Cyberattacks on Process Control Systems’ (2008) Critical Infrastructure Protection II 87Google Scholar
Ignatius, D, ‘Putin Steals the CIA’s Playbook on Anti-Soviet Covert OperationsWashington Post (Washington, DC, 9 April 2014) <www.washingtonpost.com/opinions/david-ignatius-putin-steals-from-the-cias-playbook-with-anti-soviet-covert-operations/2014/04/08/2fd4f73a-bf57-11e3-b195-dd0c1174052c_story.html>Google Scholar
Information Warfare Monitor, ‘Tracking GhostNet: Investigating a Cyberespionage Network’ (2009) <www.infowar-monitor.net/2009/09/tracking-ghostnet-investigating-a-cyber-espionage-network>>Google Scholar
International Law Commission, ‘State Responsibility: Comments and Observations Received from Governments’ (1998) A/CN4/488Google Scholar
International Law Commission, ‘Report of the International Law Commission on the Work of Its Fiftieth Session (1998). Topical Summary of the Discussion Held in the Sixth Committee of the General Assembly during Its Fifty-Third Session Prepared by the Secretariat’ (1999) A/CN4/496Google Scholar
International Law Commission, ‘Report of the International Law Commission on the Work of Its Fifty-First Session, 3 May–23 July 1999, Official Records of the General Assembly, Fifty Fourth Session, Supplement No 10’ (1999) A/54/10 <http://untreaty.un.org/ilc/reports/english/A_54_10.pdf>>Google Scholar
International Law Commission, ‘Report of the International Law Commission on the Work of Its Fifty-First Session. Topical Summary of the Discussion Held in the Sixth Committee of the General Assembly during Its Fifty-Fourth Session Prepared by the Secretariat’ (2000) A/CN4/504Google Scholar
International Law Commission, ‘Draft Articles on Prevention of Transboundary Harm from Hazardous Activities, with Commentaries’ (2001) <http://untreaty.un.org/ilc/texts/instruments/english/commentaries/9_7_2001.pdf>>Google Scholar
International Law Commission, ‘Draft Articles on Responsibility of States for Internationally Wrongful Acts, with Commentaries’ (2001) <https://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf>>Google Scholar
International Law Commission, ‘State Responsibility: Comments and Observations Received from Governments’ (2001) A/CN4/515Google Scholar
Iwasawa, Y and Iwatsuki, N, ‘Procedural Conditions’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 1149Google Scholar
Jachec-Neale, A, ‘Fact-Finding’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Jacobsson, M, ‘Evidence as an Issue in International Legal Practice’ (2006) 100 Proceedings of the American Society of International Law 40Google Scholar
Jarrett, HM and others, Prosecuting Computer Crimes (2015) <www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf>>Google Scholar
Jennings, RY, ‘The Caroline and McLeod Cases’ (1938) 32 American Journal of International Law 82Google Scholar
Jensen, ET, ‘Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense’ (2002) 38 Stanford Journal of International Law 207Google Scholar
Jensen, ET, ‘Unexpected Consequences from Knock-On Effects: A Different Standard for Computer Network Operations?’ (2003) 18 American University International Law Review 1145Google Scholar
Johnson, WJ and Gillman, AD (eds), Law of Armed Conflict Deskbook (2012) <www.loc.gov/rr/frd/Military_Law/pdf/LOAC-Deskbook-2012.pdf>>Google Scholar
Johnson, B and others, ‘Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure’ (Fire Eye, 14 December 2017) <www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html>>Google Scholar
Johnstone, I, ‘The Plea of “Necessity” in International Legal Discourse: Humanitarian Intervention and Counter-Terrorism’ (2005) 43 Columbia Journal of Transnational Law 337Google Scholar
Joseph, S and Castan, M, The International Covenant on Civil and Political Rights (3rd edn, 2013)Google Scholar
Jötten, S, Enforced Disappearances und EMRK (2012)Google Scholar
Joyner, CC and Lotrionte, C, ‘Information Warfare as International Coercion: Elements of a Legal Framework’ (2001) 12 European Journal of International Law 825Google Scholar
Jurich, JP, ‘Cyberwar and Customary International Law: The Potential of a “Bottom-up” Approach to an International Law of Information Operations’ (2008) 9 Chicago Journal of International Law 275Google Scholar
Kammerhofer, J, ‘Oil’s Well That Ends Well? Critical Comments on the Merits Judgement in the Oil Platforms Case’ (2004) 17 Leiden Journal of International Law 695Google Scholar
Kammerhofer, J, Uncertainty in International Law (2011)Google Scholar
Kamto, M, ‘The Time Factor in the Application of Countermeasures’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 1169Google Scholar
Katz-Bassett, E and others, ‘Reverse Traceroute’ (2010) USENIX Symposium on Networked Systems Design & Implementation (NSDI) <www.cs.washington.edu/research/networking/astronomy/reverse-traceroute.html>>Google Scholar
Kazazi, M, Burden of Proof and Related Issues: A Study on Evidence before International Tribunals (1996)Google Scholar
Keber, TO and Roguski, PN, ‘Ius Ad Bellum Electronicum? Cyberangriffe im Lichte der UN-Charta und aktueller Staatenpraxis’ (2011) 49 Archiv des Völkerrechts 399Google Scholar
Keitner, C, ‘Attribution by Indictment’ (2019) 113 AJIL Unbound 207Google Scholar
Kendall, J, Barron, PO, and Allenbaugh, MH, ‘The Diligence Due in the Era of Globalized Terrorism’ (2002) 36 The International Lawyer 49Google Scholar
Kerry, J, ‘Condemning Cyber-Attack by North Korea’, US Department of State (2014) <https://2009-2017.state.gov/secretary/remarks/2014/12/235444.htm>>Google Scholar
Kesan, JP and Hayes, CM, ‘Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace’ (2012) 25 Harvard Journal of Law & Technology 429Google Scholar
Kilovaty, I, ‘Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-intervention in the Era of Weaponized Information’ (2018) 9 Harvard National Security Journal 146.Google Scholar
Kinsch, P, ‘On the Uncertainties Surrounding the Standard of Proof in Proceedings before International Courts and Tribunals’ in Venturini, G and Bariatti, S (eds), Liber Fausto Pocar: Individual Rights and International Justice (2009) 427Google Scholar
Kirchner, S, ‘Distributed Denial-of-Service (DDoS)-Attacks under Public International Law: State-Responsibility in Cyberwar’ (2009) 8 ICFAI University Journal of Cyber Law 10Google Scholar
Kiss, J, ‘Sony Hack: Sacked Employees Could be to Blame, Researchers ClaimGuardian (London, 30 December 2014) <www.theguardian.com/film/2014/dec/30/sony-hack-researchers-claim-sacked-employees-could-be-to-blame?CMP=fb_gu>Google Scholar
Klein, E, ‘Gegenmaßnahmen’ (1998) 37 Berichte der Deutschen Gesellschaft für Völkerrecht 39Google Scholar
Kleinhans, JP, ‘Internet of Insecure Things: Can Security Assessment Cure Market Failures?’ (SNV, 2017) <www.stiftung-nv.de/sites/default/files/internet_of_insecure_things.pdf>>Google Scholar
Knake, RK, Untangling Attribution: Moving to Accountability in Cyberspace. Hearing on Planning for the Future of Cyberattack (2010) Subcommittee on Technology and Innovation, Committee on Science and Technology, United States House of Representatives, 111th CongressGoogle Scholar
Koh, HH, ‘The Obama Administration and International Law’ (2010) <www.state.gov/s/l/releases/remarks/139119.htm>>Google Scholar
Koh, HH, ‘Remarks at the USCYBERCOM Inter-Agency Legal Conference: International Law in Cyberspace’ (2012) <www.state.gov/s/l/releases/remarks/197924.htm>>Google Scholar
Kohen, MG, ‘The Notion of “State Survival” in International Law’ in Boisson De Chazournes, L and Sands, P (eds), International Law, the ICJ and Nuclear Weapons (1999) 293Google Scholar
Koivurora, T, ‘What Is the Principle of Due Diligence?’ in Petman, J and Klabbers, J (eds), Nordic Cosmopolitanism: Essays in International Law for Martti Koskenniemi (2003) 341Google Scholar
Kolb, R, ‘General Principles of Procedural Law’ in Zimmermann, A (ed), The Statute of the ICJ (2nd edn 2012) 871Google Scholar
Koskenniemi, M, ‘Fragmentation of International Law: Difficulties Arising from the Diversification and Expansion of International Law: Report of the Study Group of the International Law Commission’ (2006) A/CN4/L682Google Scholar
Krajewski, M, ‘Selbstverteidigung gegen bewaffnete Angriffe nicht-staatlicher Organisationen’ (2002) 40 Archiv des Völkerrechts 183Google Scholar
Kramer, AE and Perlroth, N, ‘Cyberweapon Warning from Kaspersky, a Computer Security ExpertNew York Times (New York, 3 June 2012) <www.nytimes.com/2012/06/04/technology/cyberweapon-warning-from-kaspersky-a-computer-security-expert.html>Google Scholar
Kravetz, D, ‘Internet “Kill Switch” Legislation Back in PlayWired (San Francisco, 28 January 2011) <www.wired.com/threatlevel/2011/01/kill-switch-legislation>Google Scholar
Kreß, C, Gewaltverbot Und Selbstverteidigungsrecht Nach Der Satzung Der Vereinten Nationen Bei Staatlicher Verwicklung in Gewaltakte Privater (1995)Google Scholar
Kreß, C, ‘Some Reflections on the International Legal Framework Governing Transnational Armed Conflicts’ (2010) 15 Journal of Conflict and Security Law 245Google Scholar
Kretzmer, D, ‘The Inherent Right to Self-Defence and Proportionality in Jus Ad Bellum’ (2013) 24 European Journal of International Law 235Google Scholar
Krieger, H, ‘Krieg gegen Anonymous: Völkerrechtliche Regelungsmöglichkeiten bei unsicherer Zurechnung im Cyberwar’ (2012) 50 Archiv des Völkerrechts 1Google Scholar
Kritsiotis, D, ‘Questions of Fact and Evidence and the Laws of Force’ (2006) 100 Proceedings of the American Society of International Law 39Google Scholar
Kritsiotis, D, ‘International Law and the Relativities of Enforcement’ in Crawford, J and Koskenniemi, M (eds), The Cambridge Companion to International Law (2012) 245Google Scholar
Ku, J, ‘Russia Reminds the World (and International Lawyers) of the Limits of International Law’ (2014) <http://opiniojuris.org/2014/03/02/ukraine-russia-international-law-governing-use-force>>Google Scholar
Kühnbach, L, Solidaritätspflichten Unbeteiligter: Dargelegt am Beispiel von Aggressivnotstand, Defensivnotstand, unterlassener Hilfeleistung und polizeilichem Notstand (2007)Google Scholar
Kulesza, J, ‘State Responsibility for Cyber-Attacks on International Peace and Security’ (2009) 29 Polish Yearbook of International Law 139Google Scholar
Kunig, P, ‘Intervention, Prohibition of’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Küper, W, ‘Von Kant zu Hegel: Das Legitimationsproblem des rechtfertigenden Notstandes und die freiheitsphilosophischen Notrechtslehren‘ (2005) 60 JuristenZeitung 105Google Scholar
Kurtz, J, ‘Adjudging the Exceptional at International Investment Law: Security, Public Order and Financial Crisis’ (2010) 59 International and Comparative Law Quarterly 325CrossRefGoogle Scholar
Kurtz, PB and others, ‘Virtual Criminology Report 2009: Virtually Here – The Age of Cyberwarfare’ (2009) <www.mcafee.com/us/resources/reports/rp-virtual-criminology-report-2009.pdf>>Google Scholar
Langner, R, ‘To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve’ (November 2013) <www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf>>Google Scholar
Langner, R, ‘Stuxnet’s Secret Twin’ (Foreign Policy, 19 November 2013) <http://foreignpolicy.com/2013/11/19/stuxnets-secret-twin>>Google Scholar
La Rue, F, ‘Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression’ (2013) A/HRC/23/40Google Scholar
Laughland, O, ‘Christmas Release of The Interview Cancelled by SonyGuardian (London, 18 December 2014) <www.theguardian.com/film/2014/dec/17/sony-pictures-cancels-christmas-release-the-interview>Google Scholar
Laursen, A, ‘The Judgment by the ICJ in the Oil Platforms Case’ (2004) 73 Nordic Journal of International Law 135Google Scholar
Laursen, A, ‘The Use of Force and (the State of) Necessity’ (2004) 37 Vanderbilt Journal of Transnational Law 485Google Scholar
Lawson, S, ‘Anonymous Sources Provide No Evidence of Iran CyberattacksForbes (Jersey City, NJ, 31 October 2012) <www.forbes.com/sites/seanlawson/2012/10/31/anonymous-sources-provide-no-evidence-of-iran-cyber-attacks/#4b4729793a00>Google Scholar
Leben, C, ‘Obligations Relating to the Use of Force and Arising from Peremptory Norms of International Law’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 1197Google Scholar
Lederman, M, ‘Question on 2007 Strike against Syria and Anticipatory Self-Defense’ (Opinio Juris, 2012) <http://opiniojuris.org/2012/04/06/question-on-2007-strike-against-syria-and-anticipatory-self-defense>>Google Scholar
Lee, RM and others, ‘Analysis of the Cyber Attack on the Ukrainian Power Grid’ (18 March 2016) <https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf>>Google Scholar
Leich, MN, ‘Denial of Liability: Ex Gratia Compensation on a Humanitarian Basis’ (1989) 83 American Journal of International Law 319Google Scholar
Lerche, C, Militärische Abwehrbefugnisse bei Angriffen auf Handelsschiffe (1993)Google Scholar
Lesaffre, H, ‘Circumstances Precluding Wrongfulness in the ILC Articles on State Responsibility: Countermeasures’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 469Google Scholar
Lewis, JA, The ‘Korean’ Cyberattacks and Their Implications for Cyber Conflict (2009) <http://csis.org/files/publication/091023_Korean_Cyber_Attacks_and_Their_Implications_for_Cyber_Conflict.pdf>>Google Scholar
Li, S, ‘When does Internet Denial Trigger the Right of Armed Self-Defense?’ (2013) 38 Yale Journal of International Law 179Google Scholar
Lillich, RB and Paxman, JM, ‘State Responsibility for Injuries to Aliens Occasioned in Terrorist Activities’ (1977) 26 American University Law Journal 217Google Scholar
Limnéll, J and Rid, T, ‘Is Cyberwar Real? Gauging the Threats’ (Foreign Affairs, 2014) <www.foreignaffairs.com/articles/140762/jarno-limnell-thomas-rid/is-cyberwar-real>>Google Scholar
Lin, HS, ‘Offensive Cyber Operations and the Use of Force’ (2010) 4 Journal of National Security Law & Policy 63Google Scholar
Lin, HS, ‘Arms Control in Cyberspace: Challenges and Opportunities’ (2012) World Politics Review <www.worldpoliticsreview.com/articles/print/11683>>Google Scholar
Linderfalk, U, ‘The Effect of Jus Cogens Norms: Whoever Opened Pandora’s Box, Did You Ever Think about the Consequences?’ (2007) 18 European Journal of International Law 853Google Scholar
Linderfalk, U, ‘What Is so Special about Jus Cogens? On the Difference between the Ordinary and the Peremptory International Law’ (2012) 14 International Community Law Review 3Google Scholar
Linnan, DK, ‘Iran Air Flight 655 and beyond: Free Passage, Mistaken Self-Defense, and State Responsibility’ (1991) 16 Yale Journal of International Law 245Google Scholar
Linnan, DK, ‘Self-Defense, Necessity and U.N. Collective Security: United States and Other Views’ (1991) 1 Duke Journal of Comparative & International Law 57Google Scholar
Lipson, HF, ‘Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues’ (2002) CMU/SEI-2002-SR-009 <www.sei.cmu.edu/library/abstracts/reports/02sr009.cfm>>Google Scholar
Lobel, J, ‘The Use of Force to Respond to Terrorist Attacks: The Bombing of Sudan and Afghanistan’ (1999) 24 Yale Journal of International Law 537Google Scholar
Lowe, V, ‘Precluding Wrongfulness or Responsibility: A Plea for Excuses’ (1999) 10 European Journal of International Law 405Google Scholar
Lowenfeld, AF, ‘Agora: The Downing of Iran Air Flight 655’ (1989) 83 American Journal of International Law 318Google Scholar
Lubell, N, Extraterritorial Use of Force against Non-state Actors (2010)Google Scholar
Luhmann, N, Law as a Social System (2004)Google Scholar
Mandiant, ‘APT1: Exposing One of China’s Cyberespionage Units’ (2013) <http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf>>Google Scholar
Margulies, P, ‘Sovereignty and Cyberattacks: Technology’s Challenge to the Law of State Responsibility’ (2014) 14 Melbourne Journal of International Law 496Google Scholar
Markoff, J, Sanger, DE, and Shanker, T, ‘In Digital Combat, US Finds No Easy DeterrentNew York Times (New York, 25 January 2010) <www.nytimes.com/2010/01/26/world/26cyber.html>Google Scholar
Marsh, S, ‘US Joins UK in Blaming Russia for NotPetya Cyber-AttackGuardian (London, 15 February 2018) <www.theguardian.com/technology/2018/feb/15/uk-blames-russia-notpetya-cyber-attack-ukraine>Google Scholar
Marxsen, C, ‘Violation and Confirmation of the Law: The Intricate Effects of the Invocation of the Law in Armed Conflict’ (2018) 5 Journal on the Use of Force and International Law 8Google Scholar
Mascolo, G and Steinke, R, ‘BND könnte Lizenz zum “Hack Back” bekommenSüddeutsche Zeitung (Munich, 5 September 2018) <www.sueddeutsche.de/digital/cybersicherheit-bnd-koennte-lizenz-zum-hack-back-bekommen-1.4115365>Google Scholar
Maslaton, M, Notstandsklauseln Im Regionalen Menschenrechtsschutz (2002)Google Scholar
Mattessich, W, ‘Digital Destruction: Applying the Principle of Non-intervention to Distributed Denial of Service Attacks Manifesting No Physical Damage’ (2016) 54 Columbia Journal of Transnational Law 873Google Scholar
Mattheis, C, ‘The System Theory of Niklas Luhmann and the Constitutionalization of the World Society’ (2012) 4 Goettingen Journal of International Law 625Google Scholar
Maurer, T, Cyber Norm Emergence at the United Nations: An Analysis of the UN’s Activities Regarding Cyber-Security (2011) Discussion Paper 2011-11 <http://belfercenter.ksg.harvard.edu/publication/21445/cyber_norm_emergence_at_the_united_nationsan_analysis_of_the_uns_activities_regarding_cybersecurity.html>>Google Scholar
McLaughlin, R and Schmitt, MN, ‘The Need for Clarity in International Cyber Law’ (Policy Forum, 2017) <www.policyforum.net/the-need-for-clarity-in-international-cyber-law>..>Google Scholar
Melnitzky, A, ‘Defending America against Chinese Cyberespionage through the Use of Active Defenses’ (2012) 20 Cardozo Journal of International & Comparative Law 537Google Scholar
M’Gonigle, RM and Zacher, MW, Pollution, Politics and International Law (1979)Google Scholar
Michaels, J, ‘Pentagon Seeking “Rules of Engagement” for Cyber-WarUSA Today (Tysons Corner, VA, 4 April 2013) <www.usatoday.com/story/news/nation/2013/04/04/pentagon-wants-cyber-war-rules-of-engagement/2054055>Google Scholar
Milanovic, M, ‘State Responsibility for Genocide’ (2006) 17 European Journal of International Law 553Google Scholar
Milanovic, M, ‘State Responsibility for Genocide: A Follow-Up’ (2007) 18 European Journal of International Law 669Google Scholar
Milanovic, M, ‘State Responsibility for Acts of Non-state Actors: A Comment on Griebel and Plucken’ (2009) 22 Leiden Journal of International Law 307Google Scholar
Milanovic, M, ‘Palmer Committee Report on the Mavi Marmara Incident’ (2011) EJIL Talk <www.ejiltalk.org/palmer-committee-report-on-the-mavi-marmara-incident>>Google Scholar
Milanovic, M, ‘Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age’ (2014) 56 Harvard International Law Journal 81Google Scholar
Milevski, L, ‘Stuxnet and Strategy: A Special Operation in Cyberspace?’ (2011) 63 Joint Force Quarterly 64Google Scholar
Miller, E, ‘Self-Defense, International Law and the Six-Day War’ (1985) 20 Israel Law Review 68Google Scholar
Miller, RB, ‘Justifications of the Iraq War Examined’ (2008) 22 Ethics & International Affairs 43Google Scholar
Miller, JN and Pollard, NA, ‘Persistent Engagement, Agreed Competition and Deterrence in Cyberspace’ (Lawfare, 2019) <www.lawfareblog.com/persistent-engagement-agreed-competition-and-deterrence-cyberspace>>Google Scholar
Mills, E, ‘Stuxnet: Fact vs. Theory’ (CNET, 5 October 2010) <http://news.cnet.com/8301-27080_3-20018530-245.html?tag=topStories1>>Google Scholar
Mills, E, ‘Was US Water Utility Hacked Last Week?’ (CNET, 17 November 2011) <http://news.cnet.com/8301-27080_3-57327030-245/was-u.s-water-utility-hacked-last-week>>Google Scholar
Mitchell, RB, ‘Regime Design Matters: Intentional Oil Pollution and Treaty Compliance’ (1994) 48 International Organization 425Google Scholar
Moraes, C, ‘Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs’ (2014) A7-0139/2014 <www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A7-2014-0139+0+DOC+PDF+V0//EN>>Google Scholar
Morgenthau, H, Politics among Nations (2nd edn, 1954)Google Scholar
Mosk, RM, ‘The Role of Facts in International Dispute Resolution’ (2003) 304 Recueil Des Cours 9Google Scholar
Moussa, J, ‘Can Jus Ad Bellum Override Jus in Bello? Reaffirming the Separation of the Two Bodies of Law’ (2008) 90 International Review of the Red Cross 963Google Scholar
Mrazek, J, ‘Prohibition of the Use and Threat of Force: Self-Defense and Self-Help in International Law’ (1989) 27 Canadian Yearbook of International Law 81Google Scholar
Mueller, RS III, Report on the Investigation into Russian Interference in the 2016 Presidential Election (2019) vol I of IIGoogle Scholar
Müller, GV, ‘Bis ein Unternehmen einen Cyberangriff bemerkt, dauert es im Durchschnitt 200 TageNeue Zürcher Zeitung (Zürich, 30 May 2017) <www.nzz.ch/wirtschaft/mehr-firmen-von-cyberattacken-betroffen-cyber-security-ist-kein-it-problem-ld.1298355>Google Scholar
Murase, S, ‘Unilateral Responses to International Terrorism: Self-Defense or Law Enforcement?’ in Multiculturalism and International Law: Essays in Honour of Edward McWhinney (2009) 429Google Scholar
Nakashima, E, ‘Pentagon Proposes More Robust Role for Its Cyber-SpecialistsWashington Post (Washington, DC, 10 August 2012) <www.washingtonpost.com/world/national-security/pentagon-proposes-more-robust-role-for-its-cyber-specialists/2012/08/09/1e3478ca-db15-11e1-9745-d9ae6098d493_story.html>Google Scholar
Nakashima, E and Warrick, J, ‘Stuxnet Was Work of US and Israeli Experts, Officials SayWashington Post (Washington, DC, 2 June 2012) <www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html>Google Scholar
Nakashima, E and Rucker, P, ‘U.S. Declares North Korea Carried out Massive WannaCry CyberattackWashington Post (Washington, DC, 19 December 2017) <www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html?utm_term=.4943a2c04565>Google Scholar
Nanda, VP, ‘The “Torrey Canyon” Disaster: Some Legal Aspects’ (1967) 44 Denver Law Journal 400Google Scholar
Neuneck, G, ‘Civilian and Military Cyberthreats: Shifting Identities and Attribution’ in United Nations Institute for Disarmament Research (ed), The Cyber Index: International Security Trends and Reality (2013) 115Google Scholar
Nichols, S, ‘Lazarus Group Rises Again from the Digital Grave with Hoplight Malware for All’ (The Register, 10 April 2019) <www.theregister.co.uk/2019/04/10/lazarus_group_malware>>Google Scholar
Nollkaemper, A, ‘Concurrence between Individual Responsibility and State Responsibility in International Law’ (2003) 52 International and Comparative Law Quarterly 615Google Scholar
Noortmann, N, Enforcing International Law: From Self-Help to Self-Contained Regimes (2005)Google Scholar
Nye, JS, Cyber Power (2010)Google Scholar
O’Connell, ME, ‘Evidence of Terror’ (2002) 7 Journal of Conflict and Security Law 19Google Scholar
O’Connell, ME, ‘Rules of Evidence for the Use of Force in International Law’s New Era’ (2006) 100 Proceedings of the American Society of International Law 44Google Scholar
O’Connell, ME, The Power and Purpose of International Law: Insights from the Theory and Practice of Enforcement (2008)Google Scholar
O’Connell, ME, ‘Cybersecurity without Cyberwar’ (2012) 17 Journal of Conflict and Security Law 187Google Scholar
O’Donnell, T, ‘Security Council Resolution 1530, Evidence and the United Nations Security Council’ (2006) 100 Proceedings of the American Society of International Law 47Google Scholar
Office of the Secretary of Defense, ‘Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2013’ (2013) <www.defense.gov/pubs/2013_china_report_final.pdf>>Google Scholar
Ogus, AI, The Law of Damages (1973)Google Scholar
Ohlin, JD, ‘Did Russian Cyber-Interference in the 2016 Election Violate International Law?’ (2017) 95 Texas Law Review 1579Google Scholar
Ohlin, JD and May, L, Necessity in International Law (2016)Google Scholar
O’Keefe, R, ‘Proportionality’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 1157Google Scholar
Olson, KK, ‘Cyberspace as Place and the Limits of Metaphor’ (2005) 11 Convergence: The Journal of Research into New Media Technologies 10Google Scholar
Orakhelashvili, A, ‘Current Developments: Oil Platforms (Islamic Republic of Iran v United States of America), Merits, Judgment of 6 November 2003’ (2004) 53 International and Comparative Law Quarterly 753Google Scholar
Orakhelashvili, A, Peremptory Norms in International Law (2006)Google Scholar
Owens, WA, Dam, KW, and Lin, H, Technology, Policy, Law, and Ethics Regarding US Acquisition and Use of Cyberattack Capabilities (2009)Google Scholar
Pagliery, J, ‘The Inside Story of the Biggest Hack in History’ (CNN, 5 August 2015) <https://money.cnn.com/2015/08/05/technology/aramco-hack/index.html>>Google Scholar
Peevers, C, The Politics of Justifying Force: The Suez Crisis, the Iraq War, and International Law (2013)Google Scholar
Pellet, A, ‘Can a State Commit a Crime? Definitely, Yes!’ (1999) 10 European Journal of International Law 425Google Scholar
Pellet, A, ‘Comments in Response to Christine Chinkin and in Defense of Jus Cogens as the Best Bastion against the Excesses of Fragmentation’ (2006) 17 Finnish Yearbook of International Law 83Google Scholar
Pellet, A, ‘The Definition of Responsibility in International Law’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 3Google Scholar
Pellet, A and Miron, A ‘Sanctions’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Perina, AH, ‘Black Holes and Open Secrets: The Impact of Covert Action on International Law’ (2015) 53 Columbia Journal of Transnational Law 507Google Scholar
Perlroth, N, ‘In Cyberattack on Saudi Firm, US Sees Iran Firing BackNew York Times (New York, 23 October 2012) <www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html>Google Scholar
Perlroth, N and Sanger, DE, ‘New Computer Attacks Traced to Iran, Officials SayNew York Times (New York, 25 May 2013) A10Google Scholar
Peters, A, ‘Surveillance without Borders? The Unlawfulness of the NSA-Panopticon, Part I’ (EJIL Talk, 2013) <www.ejiltalk.org/surveillance-without-borders-the-unlawfulness-of-the-nsa-panopticon-part-i>>Google Scholar
Pfeil, J, ‘Naulilaa Arbitration (Portugal v Germany)’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Pictet, J, Commentary on the Geneva Conventions of 12 August 1949, vol I (1952)Google Scholar
Pihelgas, M, ‘Back-Tracing and Anonymity in Cyberspace’ in Zielkowski, K (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (2013) 31Google Scholar
Portmess, L, ‘Compensation Ex Gratia and the Vincennes Incident’ (1992) 6 Public Affairs Quarterly 401Google Scholar
Proulx, V-J, ‘Babysitting Terrorists: Should States be Strictly Liable for Failing to Prevent Transborder Attacks?’ (2005) 23 Berkeley Journal of International Law 615Google Scholar
Quigley, J, The Six-Day War and Israeli Self-Defense (2013)Google Scholar
Raab, D, ‘“Armed Attack” after the Oil Platforms Case’ (2004) 17 Leiden Journal of International Law 719Google Scholar
Radsan, AJ, ‘The Unresolved Equation of Espionage and International Law’ (2007) 28 Michigan Journal of International Law 595Google Scholar
Randelzhofer, A and Nolte, G, ‘Article 51’ in Simma, B and others (eds), The Charter of the United Nations: A Commentary (3rd edn, 2012)Google Scholar
Ranger, S, ‘What Is Cyberwar? Everything You Need to Know about the Frightening Future of Digital Conflict’ (ZDNet, 4 December 2018) <www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict>>Google Scholar
Ratner, SR, ‘Jus Ad Bellum and Jus in Bello after September 11’ (2002) 96 American Journal of International Law 908Google Scholar
Ratner, SR, ‘Persuading to Comply: On the Deployment and Avoidance of Legal Argumentation’ in Dunoff, JL and Pollack, MA (eds), Interdisciplinary Perspectives on International Law and International Relations (2013) 568Google Scholar
Reinisch, A, ‘Sachverständigengutachten zur Frage des Bestehens und der Wirkung des völkerrechtlichen Rechtfertigungsgrundes “Staatsnotstand”’ (2008) 68 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 3Google Scholar
Reisman, WM, ‘Assessing Claims to Revise the Laws of War’ (2003) 97 American Journal of International Law 82Google Scholar
Reisman, WM and Parajon Skinner, C, Fraudulent Evidence before Public International Tribunals: The Dirty Stories of International Law (2014)Google Scholar
Reißmann, O, ‘Ferngesteuertes Wasserwerk: Hacker führen US-Behörden vorDer Spiegel (Hamburg, 20 November 2011) <www.spiegel.de/netzwelt/web/0,1518,798866,00.html>Google Scholar
Ricks, TE, ‘The Future of War: Cyber Is Expanding the Clausewitzian Spectrum of Conflict’ (Foreign Policy, 13 November 2014) <http://foreignpolicy.com/2014/11/13/the-future-of-war-cyber-is-expanding-the-clausewitzian-spectrum-of-conflict>>Google Scholar
Rid, T, ‘Cyberwar Will Not Take Place’ (2012) 35 Journal of Strategic Studies 5Google Scholar
Rid, T, ‘Cyberwar and Peace: Hacking Can Reduce Real-World Violence’ (2013) 92 Foreign Affairs 77Google Scholar
Rid, T and Buchanan, B, ‘Attributing Cyberattacks’ (2015) 38 Journal of Strategic Studies 4Google Scholar
Riddell, A and Plant, B, Evidence before the ICJ (2009)Google Scholar
Riley, M and Engleman, E, ‘Code in Aramco Cyberattack Indicates Lone Perpetrator’ (Bloomberg News, 25 October 2012) <www.bloomberg.com/news/2012-10-25/code-in-aramco-cyber-attack-indicates-lone-perpetrator.html>>Google Scholar
Rivkin, DB Jr and Casey, LA, ‘Saddam, Nikita and Virtual Weapons of Mass Destruction: A Question of Threat Perception and Intelligence Assessment’ (The National Interest, 2003) <http://nationalinterest.org/article/saddam-nikita-and-virtual-weapons-of-mass-destructiona-question-of-threat-percep-2362>>Google Scholar
Rivkin, DB Jr, Casey, LA, and DeLaquil, MW, ‘Preemption and Law in the Twenty-First Century’ (2005) 5 Chicago Journal of International Law 467Google Scholar
Rizmal, I, ‘Cyberterrorism: What Are We (Not) Talking About?’ (Diplo, 3 August 2017) <www.diplomacy.edu/blog/cyberterrorism-what-are-we-not-talking-about>>Google Scholar
Roberts, A, ‘Legality vs Legitimacy: Can Uses of Force Be Illegal but Justified?’ in Alston, P and Macdonald, E (eds), Human Rights, Intervention, and the Use of Force (2008) 179Google Scholar
Roberts, PF, ‘If This Is Cyberwar, Where Are All the Cyberweapons?’ (MIT Technology Review, 27 January 2014) <www.technologyreview.com/news/523931/if-this-is-cyberwar-where-are-all-the-cyberweapons>>Google Scholar
Robertson, J and Riley, M, ‘Mysterious ’08 Turkey Pipeline Blast Opened New Cyberwar Era’ (Bloomberg News, 10 December 2014) <www.bloomberg.com/news/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar.html>>Google Scholar
Rõigas, H, ‘An Updated Draft of the Code of Conduct Distributed in the United Nations: What’s New?’ (2015) <https://ccdcoe.org/updated-draft-code-conduct-distributed-united-nations-whats-new.html>>Google Scholar
Romano, J-A, ‘Combating Terrorism and Weapons of Mass Destruction: Reviving the Doctrine of a State of Necessity’ (1999) 87 Georgetown Law Journal 1023Google Scholar
Roscini, M, ‘World Wide Warfare: Jus Ad Bellum and the Use of Cyber Force’ (2010) 14 Max Planck United Nations Yearbook 85Google Scholar
Roscini, M, Cyber Operations and the Use of Force in International Law (2014)Google Scholar
Roscini, M, ‘Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations’ in Ohlin, JD and others (eds), Cyberwar: Law and Ethics for Virtual Conflicts (2015) 215Google Scholar
Rosenne, S and Yankov, A, United Nations Convention on the Law of the Sea 1982: A Commentary, vol IV (1991)Google Scholar
Rosenzweig, P, ‘National Security Threats in Cyberspace: A Workshop’ (2009) <www.americanbar.org/content/dam/aba/migrated/natsecurity/threats_in_cyberspace.authcheckdam.pdf>>Google Scholar
Rotenberg, M, Attribution: Hearing on Planning for the Future of Cyberattack (2010) <http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1106&context=cong>>Google Scholar
Ruys, T, ‘Quo Vadit Jus Ad Bellum? A Legal Analysis of Turkey’s Military Operations against the PKK in Northern Iraq’ (2008) 9 Melbourne Journal of International Law 334Google Scholar
Ruys, T, ‘Armed Attack’ and Article 51 of the UN Charter: Evolutions in Customary Law and Practice (2010)Google Scholar
Ryngaert, C, ‘State Responsibility, Necessity and Human Rights’ (2010) 41 Netherlands Yearbook of International Law 79Google Scholar
Rytter, JE, ‘Humanitarian Intervention without the Security Council: From San Francisco to Kosovo – and Beyond’ (2001) 70 Nordic Journal of International Law 121Google Scholar
Salmon, JJA, ‘Faut-Il Codifier L’État de Nécessité En Droit International?’ in Makarczyk, J (ed), Essays in International Law in Honour of Judge Manfred Lachs (1984) 235Google Scholar
Sanger, DE, ‘US Blames China’s Military Directly for CyberattacksNew York Times (New York, 6 May 2013) A1Google Scholar
Sanger, DE, ‘US and China Seek Arms Deal for CyberspaceNew York Times (New York, 19 September 2015) A1Google Scholar
Sanger, DE, The Perfect Weapon (2018)Google Scholar
Sanger, DE, Barboza, D, and Perlroth, N, ‘Chinese Army Unit Is Seen as Tied to Hacking against USThe New York Times (New York, 19 February 2013) A1Google Scholar
Sanger, DE and Fackler, M, ‘N.S.A. Breached North Korean Networks before Sony Attack, Officials SayNew York Times (New York, 18 January 2015)<www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?_r=0>Google Scholar
Sanger, DE and Mazzetti, M, ‘U.S. had Cyberattack Plan if Iran Nuclear Dispute Led to ConflictNew York Times (New York, 16 February 2016) <www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html>Google Scholar
Sanger, DE and Perlroth, N, ‘U.S. Escalates Online Attacks on Russia’s Power GridNew York Times (New York, 15 June 2019) <www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html>Google Scholar
Sari, A, ‘Hybrid Warfare, Law and the Fulda Gap’ in Williams, WS and Ford, CM (eds), Complex Battlespaces: The Law of Armed Conflict and the Dynamics of Modern Warfare (2019), 161.Google Scholar
Schaap, AJ, ‘Cyberwarfare Operations: Development and Use under International Law’ (2009) 64 Air Force Law Review 121Google Scholar
Schachter, O, ‘The Lawful Use of Force by a State against Terrorists in Another Country’ (1989) 19 Israel Yearbook on Human Rights 209Google Scholar
Schmahl, S, ‘Zwischenstaatliche Kompetenzabgrenzung Im Cyberspace’ (2009) 47 Archiv des Völkerrechts 284Google Scholar
Schmitt, C, Political Theology: Four Chapters on the Concept of Sovereignty (2005)Google Scholar
Schmitt, MN, ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885Google Scholar
Schmitt, MN, ‘Preemptive Strategies in International Law’ (2003) 24 Michigan Journal of International Law 513Google Scholar
Schmitt, MN, ‘US Security Strategies: A Legal Assessment’ (2004) 27 Harvard Journal of Law & Public Policy 737Google Scholar
Schmitt, MN, ‘Cyber Operations and the Jus Ad Bellum Revisited’ (2011) 56 Villanova Law Review 569Google Scholar
Schmitt, MN, ‘Cyber Activities and the Law of Countermeasures’ in Ziolkowski, K (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (2013) 659Google Scholar
Schmitt, MN, ‘Grey Zones in the International Law of Cyberspace’ (2017) 42 Yale Journal of International Law 2Google Scholar
Schmitt, MN, (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2017)Google Scholar
Schmitt, MN, ‘Cyber Activities and the Law of Countermeasures’ in Ziolkowski, K“Virtual” Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law’ (2018) 19 Chicago Journal of International Law 30Google Scholar
Schmitt, MN, ‘Cyber Activities and the Law of Countermeasures’ in Ziolkowski, K ‘Estonia Speaks out on Key Rules for Cyberspace’ (Just Security, 2019) <www.justsecurity.org/64490/estonia-speaks-out-on-key-rules-for-cyberspace>>Google Scholar
Schmitt, MN and Vihul, L, ‘Respect for Sovereignty in Cyberspace’ (2017) 95 Texas Law Review 1639Google Scholar
Schneider, JG, ‘Persistent Engagement: Foundation, Evolution and Evaluation of a Strategy‘ (Lawfare, 10 May 2019) <www.lawfareblog.com/persistent-engagement-foundation-evolution-and-evaluation-strategy>>Google Scholar
Schneier, B, ‘Anonymity and the Internet’ (Schneier on Security, 3 February 2010) <www.schneier.com/blog/archives/2010/02/anonymity_and_t_3.html>>Google Scholar
Schneier, B, ‘Choosing Secure Passwords’ (Schneier on Security, 3 March 2014) <www.schneier.com/blog/archives/2014/03/choosing_secure_1.html>>Google Scholar
Schneier, B, ‘Did North Korea Really Attack Sony?’ (The Atlantic, 22 December 2014) <www.theatlantic.com/international/archive/2014/12/did-north-korea-really-attack-sony/383973/?single_page=true>>Google Scholar
Schneier, B, ‘We Still Don’t Know Who Hacked SonyThe Atlantic (Washington, DC, 5 January 2015) <www.theatlantic.com/international/archive/2015/01/we-still-dont-know-who-hacked-sony-north-korea/384198>Google Scholar
Schneier, B, ‘What’s Next in Government SurveillanceThe Atlantic (Washington, DC, 2 March 2015) <www.theatlantic.com/international/archive/2015/03/whats-next-in-government-surveillance/385667>Google Scholar
Schneier, B, Click Here to Kill Everybody (2018)Google Scholar
Schröder, M, ‘Precautionary Approach/Principle’, in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012) 400Google Scholar
Schultz, GP, ‘Low Intensity Warfare, the Challenge of Ambiguity’ (1986) 25 ILM 204Google Scholar
Schulze, M, ‘Governance von 0-Day-Schwachstellen in der deutschen Cyber-Sicherheitspolitik’ (SWP, 2019) <www.swp-berlin.org/publikation/governance-von-0-day-schwachstellen>>Google Scholar
Segal, A and Waxman, MC, ‘Why a Cybersecurity Treaty Is a Pipe Dream’ (2011) Council on Foreign Relations <www.cfr.org/cybersecurity/why-cybersecurity-treaty-pipe-dream/p26325>>Google Scholar
Shackelford, SJ, ‘From Nuclear War to Net War: Analogizing Cyberattacks in International Law’ (2009) 27 Berkeley Journal of International Law 191Google Scholar
Shackelford, SJ and Andres, RB, ‘State Responsibility for Cyberattacks: Competing Standards for a Growing Problem’ (2011) 42 Georgetown Journal of International Law 971Google Scholar
Shany, Y, ‘Know Your Rights! The Flotilla Report and International Law Governing Naval Blockades’ (EJIL Talk, 2010) <www.ejiltalk.org/know-your-rights-the-flotilla-report-and-international-law-governing-naval-blockades>>Google Scholar
Sharp, WG, Cyberspace and the Use of Force (1999)Google Scholar
Shaw, MN, International Law (6th edn, 2008)Google Scholar
Shelton, D, ‘Reparations’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Silver, DB, ‘Computer Network Attack as a Use of Force under Article 2(4) of the United Nations Charter’ in Schmitt, MN and O’Donnell, BT (eds), Computer Network Attack and International Law (2002) 73Google Scholar
Simma, B, ‘Grundfragen der Staatenverantwortlichkeit in der Arbeit der International Law Commission’ (1986) 24 Archiv des Völkerrechts 357Google Scholar
Simma, B and Pulkowski, D, ‘Of Planets and the Universe: Self-Contained Regimes in International Law’ (2006) 17 European Journal of International Law 483Google Scholar
Singer, PW and Friedman, A, Cybersecurity and Cyberwar: What Everyone Needs to Know (2014)Google Scholar
Sklerov, MJ, ‘Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect Their Duty to Prevent’ (2009) 201 Military Law Review 1Google Scholar
Sloane, RD, ‘On the Use and Abuse of Necessity in the Law of State Responsibility’ (2012) 106 American Journal of International Law 447Google Scholar
Smith, JE (ed), ‘Torrey Canyon’ Pollution and Marine Life (1968)Google Scholar
Sofaer, AD, ‘Terrorism and the Law’ (1986) 64 Foreign Affairs 901Google Scholar
Sofaer, AD, ‘Compensation for Iranian Airbus Tragedy’ Statement before the Defense Policy Panel of the House Committee of Armed Services (4 August 1988) <http://findarticles.com/p/articles/mi_m1079/is_n2139_v88/ai_6876360/?tag=content;col1>>Google Scholar
Spencer, R, ‘Stuxnet Virus Attack on Iranian Nuclear Programme: The First Strike by Computer?Telegraph (London, 4 October 2010) <www.telegraph.co.uk/news/worldnews/middleeast/iran/8040656/Stuxnet-virus-attack-on-Iranian-nuclear-programme-the-first-strike-by-computer.html>Google Scholar
Spiermann, O, ‘Humanitarian Intervention as a Necessity and the Threat or Use of Jus Cogens’ (2002) 71 Nordic Journal of International Law 523Google Scholar
Sreenivasa Rao, P, ‘Countermeasures in International Law: The Contribution of the International Law Commission’, in Studi di diritto internazionale in onore di Gaetano Arangio-Ruiz, vol. 2 (2004)Google Scholar
Stahlberg, T and Lahmann, H, ‘A Paradigm of Prevention: Humpty Dumpty, the War on Terror, and the Power of Preventive Detention in the United States, Israel, and Europe’ (2011) 59 American Journal of Comparative Law 1051Google Scholar
Stein, T and Marauhn, T, ‘Völkerrechtliche Aspekte von Informationsoperationen’ (2000) 60 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 1Google Scholar
Stein, T and von Buttlar, C, Völkerrecht (13th edn, 2012)Google Scholar
Stevenson, J, ‘A Different Kind of EmergencyNew York Review of Books (New York, 23 May 2019) <www.nybooks.com/articles/2019/05/23/trump-different-emergency>Google Scholar
Stilgherrian, ‘Blaming Russia for NotPetya Was Coordinated Diplomatic Action’ (ZDNet, 12 April 2018) <www.zdnet.com/article/blaming-russia-for-notpetya-was-coordinated-diplomatic-action>>Google Scholar
Stohl, M, ‘Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?’ (2006) 46 Journal of Crime, Law & Social Change 223Google Scholar
Suarez, SV, ‘Korean Air Lines Incident (1983)’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Swaine, J, ‘Georgia: Russia “Conducting Cyberwar”Telegraph (London, 11 August 2008) <www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html>Google Scholar
Swartz, J, ‘“Kill Switch” Internet Bill Alarms Privacy ExpertsUSA Today (Tysons Corner, VA, 15 February 2011) <http://usatoday30.usatoday.com/tech/news/internetprivacy/2011-02-15-kill-switch_N.htm>Google Scholar
Szurek, S, ‘The Notion of Circumstances Precluding Wrongfulness’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 427Google Scholar
Taft, WH IV, ‘Self-Defense and the Oil Platforms Decision’ (2004) 29 Yale Journal of International Law 295Google Scholar
Tams, CJ, ‘Recognizing Guarantees and Assurances of Non-repetition: LaGrand and the Law of State Responsibility’ (2002) 27 Yale Journal of International Law 441Google Scholar
Tams, CJ, ‘Light Treatment of a Complex Problem: The Law of Self-Defence in the Wall Case’ (2005) 16 European Journal of International Law 963Google Scholar
Tams, CJ, ‘The Use of Force against Terrorists’ (2009) 20 European Journal of International Law 359Google Scholar
Tanriverdi, H, ‘Die Hackback-Pläne der Bundesregierung‘ (Tagesschau, 29 May 2019) <www.tagesschau.de/investigativ/seehofer-cyberabwehr-103.html>>Google Scholar
Tanzi, A, ‘Necessity, State of’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Taylor, A, ‘Sorry, but That “Chinese” Hacking Report Proves Nothing’ (Business Insider, 19 February 2013) <www.businessinsider.com/mandiant-china-report-questioned-2013-2>>Google Scholar
The Economist, ‘Internet Blackouts: Reaching for the Kill Switch’ (10 February 2011) <www.economist.com/node/18112043>>Google Scholar
The White House, ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’ (2011) <www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf>>Google Scholar
The White House, ‘Presidential Policy Directive/PPD-20’ (2012) <www.guardian.co.uk/world/interactive/2013/jun/07/obama-cyber-directive-full-text>>Google Scholar
Thompson, A, ‘Coercive Enforcement of International Law’ in Dunoff, JL and Pollack, MA (eds), Interdisciplinary Perspectives on International Law and International Relations (2013) 502Google Scholar
Thürer, D and Burri, T, ‘Self-Determination’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Tikk, E and others, International Cyber Incidents: Legal Considerations (2010) <https://ccdcoe.org/publications/books/legalconsiderations.pdf>>Google Scholar
Tomaševski, K, Responding to Human Rights Violations: 1946–1999 (2000)Google Scholar
Tomuschat, C, ‘Are Counter-Measures Subject to Prior Recourse to Dispute Settlement Procedures?’ (1994) 5 European Journal of International Law 77Google Scholar
Tomuschat, C, ‘Reparation in Cases of Genocide’ (2007) 5 Journal of International Criminal Justice 905Google Scholar
Trapp, KN, State Responsibility for International Terrorism: Problems and Prospects (2011)Google Scholar
Troianovski, A, ‘Investigators in Downing of Jet over Ukraine Charge 4 Suspects with Ties to Russian Intelligence, Pro-Moscow MilitiaWashington Post (Washington, DC, 19 June 2019) <www.washingtonpost.com/world/europe/investigation-into-downing-of-flight-mh-17-over-ukraine-names-four-russian-ukrainian-suspects/2019/06/19/02d52e42-9280-11e9-aadb-74e6b2b46f6a_story.html?noredirect=on&utm_term=.c2c1dc3eddaf>Google Scholar
Tromparent, P, ‘French Cyberdefence Policy’ in Czosseck, C, Ottis, R, and Ziolkowski, K (eds), 2012 4th International Conference on Cyber Conflict – Proceedings (2012) 77Google Scholar
Trouwborst, A, Precautionary Rights and Duties of States (2006)Google Scholar
Tsagourias, N, ‘Necessity and the Use of Force: A Special Regime’ (2010) 41 Netherlands Yearbook of International Law 11Google Scholar
UN General Secretary, ‘Developments in the Field of Information and Telecommunications in the Context of International Security’ (2011) A/66/152Google Scholar
US Department of Defense, Office of General Counsel, ‘An Assessment of International Legal Issues in Information Operations’ (1999) <www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf>>Google Scholar
US Department of State, International Security Advisory Board, ‘A Framework for International Cyber Stability’ (2014) <www.state.gov/documents/organization/229235.pdf>>Google Scholar
Utton, AE, ‘Protective Measures and the “Torrey Canyon”’ (1968) 9 Boston College Industrial and Commercial Law Review 613Google Scholar
Valeriano, B, ‘Cyberwar and Rivalry: The Dynamics of Cyber Conflict between Antagonists, 2001–2011’ (2012) <http://wpsa.research.pdx.edu/meet/2012/manessvaleriano.pdf>>Google Scholar
de Vattel, E, The Law of Nations, Or, Principles of the Law of Nature, Applied to the Conduct and Affairs of Nations and Sovereigns (4th edn, 1811)Google Scholar
Vázquez-Irizarry, W, ‘Excepción y necesidad: la posibilidad de una teoría general de emergencia’ (2010) Sela 2010: Inseguridad, democracia y derecho, 274Google Scholar
Vecchione, E, ‘Is It Possible to Provide Evidence of Insufficient Evidence? The Precautionary Principle at the WTO’ (2013) 13 Chicago Journal of International Law 153Google Scholar
Verdross, A and Simma, B, Universelles Völkerrecht (3rd edn, 1984)Google Scholar
Victor, DG, ‘Enforcing International Law: Implications for an Effective Global Warming Regime’ (1999) 10 Duke Environmental Law & Policy Forum 147Google Scholar
von Bar, C, Gemeineuropäisches Deliktsrecht, Band II (1999)Google Scholar
von Carlowitz, L, ‘Interpreting Self-Defense Restrictively: The World Court in the Oil Platforms Case’ (2005) 23 Sicherheit und Frieden 79Google Scholar
von Stein, J, ‘The Engines of Compliance’ in Dunoff, JL and Pollack, MA (eds), Interdisciplinary Perspectives on International Law and International Relations (2013) 477Google Scholar
Waibel, M, ‘Two Worlds of Necessity in ICSID Arbitration: CMS and LG&E’ (2007) 20 Leiden Journal of International Law 637Google Scholar
Wakefield, J, ‘Tax Software Blamed for Cyber-Attack Spread’ BBC (28 June 2017) <www.bbc.com/news/technology-40428967>>Google Scholar
Ward, A, ‘ISIS’s Use of Social Media Still Poses a Threat to Stability in the Middle East and Africa’ (The Rand Blog, 11 December 2018) <www.rand.org/blog/2018/12/isiss-use-of-social-media-still-poses-a-threat-to-stability.html>>Google Scholar
Waterman, S, ‘Microsoft Calls for UN-type Body to Attribute Big Cyberattacks’ (fedscoop, 23 June 2016) <www.fedscoop.com/microsoft-wants-iaea-type-body-to-attribute-big-cyberattacks>>Google Scholar
Watts, S, ‘Low-Intensity Cyber Operations and the Principle of Non-intervention’ in Ohlin, JD and others (eds), Cyber War (2015), 249Google Scholar
Waxman, MC, ‘Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)’ (2011) 36 Yale Journal of International Law 421Google Scholar
Weaver, N, ‘The GCHQ’s Vulnerabilities Equities Process’ (Lawfare, 2019) <www.lawfareblog.com/gchqs-vulnerabilities-equities-process>>Google Scholar
Webb, P, ‘Deadlock or Restraint? The Security Council Veto and the Use of Force in Syria’ (2014) 19 Journal of Conflict and Security Law 471Google Scholar
Wedgwood, R, ‘Responding to Terrorism: The Strikes against Bin Laden’ (1999) 24 Yale Journal of International Law 559Google Scholar
Wedgwood, R, ‘The ICJ Advisory Opinion on the Israeli Security Fence and the Limits of Self-Defense’ (2005) 99 American Journal of International Law 52Google Scholar
Weir, T, ‘Complex Liabilities’ in Tunc, André (ed), International Encyclopedia of Comparative Law, Volume XI: Torts (1976)Google Scholar
Wendel, P, State Responsibility for Interferences with the Freedom of Navigation in Public International Law (2007)Google Scholar
Wengler, W, ‘Public International Law: Paradoxes of a Legal Order’ (1977) 158 Recueil Des Cours 16Google Scholar
Wilmshurst, E, ‘Principles of International Law on the Use of Force by States in Self-Defence’ (2005) <www.chathamhouse.org/publications/papers/view/108106>>Google Scholar
Wintour, P, ‘Russian Bid to Influence Brexit Vote Detailed in New US Senate ReportGuardian (London, 10 January 2018) <www.theguardian.com/world/2018/jan/10/russian-influence-brexit-vote-detailed-us-senate-report>Google Scholar
Wheeler, DA and Larsen, GN, Techniques for Cyberattack Attribution (October 2003) <http://handle.dtic.mil/100.2/ADA468859>>Google Scholar
Wolfrum, R, ‘International Courts and Tribunals, Evidence’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Woltag, JC, ‘Computer Network Operations below the Level of Armed Force’, European Society of International Law – Conference Paper Series (2011)Google Scholar
Woltag, JC, ‘Cyberwarfare’ in Wolfrum, R (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Woltag, JC, Cyberwarfare: Military Cross-Border Computer Network Operations under International Law (2014)Google Scholar
Wright, J, Cyber and International Law in the 21st Century (2018) <www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century>>Google Scholar
Wyler, E and Papaux, A, ‘The Different Forms of Reparation: Satisfaction’ in Crawford, J and others (eds), The Law of International Responsibility (2010) 623Google Scholar
Yoo, CS, ‘Cyberespionage or Cyberwar? International Law, Domestic Law, and Self-Protective Measures’ in Ohlin, JD, Govern, K, and Finkelstein, C (eds), Cyberwar: Law and Ethics for Virtual Conflicts (2015) 175Google Scholar
Zemanek, K, Haftungsformen Im Völkerrecht (1980)Google Scholar
Zemanek, K, ‘Schuld- und Erfolgshaftung im Entwurf der Völkerrechtskommission über Staatenverantwortlichkeit. Zugleich Bemerkungen zum Prozess der Kodifikation im Rahmen der Vereinten Nationen’ in Dietz, E (ed), Festschrift für Rudolf Bindschedler (1980) 315Google Scholar
Zemanek, K, ‘Armed Attack’, in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (2012)Google Scholar
Zetter, K, ‘Lawmaker Wants “Show of Force” against North Korea for Website AttacksWired (San Francisco, 10 July 2009) <www.wired.com/threatlevel/2009/07/show-of-force>Google Scholar
Zetter, K, ‘Cyberattacks Traced to the US, BritainWired (San Francisco, 14 July 2009) <www.wired.com/threatlevel/2009/07/brits-attack-us>Google Scholar
Zetter, K, ‘New Clues Point to Israel as Author of Blockbuster Worm, or NotWired (San Francisco, 1 October 2010) <www.wired.com/threatlevel/2010/10/stuxnet-deconstructed>Google Scholar
Zetter, K, ‘H(ackers)2O: Attack on City Water Station Destroys PumpWired (San Francisco, 18 November 2011) <www.wired.com/threatlevel/2011/11/hackers-destroy-water-pump>Google Scholar
Zetter, K, ‘Logic Bomb Set off South Korea CyberattackWired (San Francisco, 21 March 2013) <www.wired.com/threatlevel/2013/03/logic-bomb-south-korea-attack>Google Scholar
Zetter, K, Countdown to Zero Day (2014)Google Scholar
Zetter, K, ‘The Evidence That North Korea Hacked Sony Is FlimsyWired (San Francisco, 17 December 2014) <www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin>Google Scholar
Zetter, K, ‘The Biggest Security Threats We’ll Face in 2015Wired (San Francisco, 4 January 2015) <www.wired.com/2015/01/security-predictions-2015>Google Scholar
Zetter, K, ‘Critics Say New Evidence Linking North Korea to the Sony Hack Is Still FlimsyWired (San Francisco, 8 January 2015) <www.wired.com/2015/01/critics-say-new-north-korea-evidence-sony-still-flimsy>Google Scholar
Zimmermann, A, ‘The Second Lebanon War: Jus Ad Bellum, Jus in Bello and the Issue of Proportionality’ (2007) 11 Max Planck Yearbook of United Nations Law 99Google Scholar
Zimmermann, A, ‘International Law and “Cyber Space”’ (2014) 3 ESIL Reflections 1Google Scholar
Ziolkowski, K, ‘Ius Ad Bellum in Cyberspace: Some Thoughts on the “Schmitt-Criteria” for Use of Force’ in Czosseck, C and others (eds), 2012 4th International Conference on Cyber Conflict – Proceedings (2012) 295Google Scholar
Zoller, E, Peacetime Unilateral Remedies: An Analysis of Countermeasures (1984)Google Scholar
Zuckerman, E and others, ‘2010 Report on Distributed Denial of Service (DDoS) Attacks’ (2010) Research Publication No. 2010-16Google Scholar
Zwitter, A, ‘The Rule of Law in Times of Crisis: A Legal Theory on the State of Emergency in Liberal Democracy’ (2013) University of Groningen Faculty of Law Research Paper No. 10/2013Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Henning Lahmann
  • Book: Unilateral Remedies to Cyber Operations
  • Online publication: 31 March 2020
  • Chapter DOI: https://doi.org/10.1017/9781108807050.015
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Henning Lahmann
  • Book: Unilateral Remedies to Cyber Operations
  • Online publication: 31 March 2020
  • Chapter DOI: https://doi.org/10.1017/9781108807050.015
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Henning Lahmann
  • Book: Unilateral Remedies to Cyber Operations
  • Online publication: 31 March 2020
  • Chapter DOI: https://doi.org/10.1017/9781108807050.015
Available formats
×