Abstract
Cyber technology is likely to become an essential terrorist tool. However, to implement rules on the use of force may entail certain difficulties in view of the specific characteristics of cyber technology. This section shows that, given the rapid and anonymous character of a cyberattack, it may be difficult to attribute it to its originator. There are two exceptions to the prohibition on the use of armed force between states: the use of force enshrined within the right to self-defence in response to an armed attack; the use of force as authorised by UN Security Council. The UN Security Council is the principal organ of the United Nations responsible for maintenance of international peace and security. The analysis has demonstrated that current international law on the use of force offers an incomplete and ineffective response to international cyberterrorism, in particular because it does not allow reaction in self-defence against those non-state actors who are expected to be the principal cyberterrorists.
Original language | English |
---|---|
Title of host publication | Terrorism Online |
Subtitle of host publication | Politics, Law and Technology |
Publisher | Taylor and Francis Inc. |
Pages | 35-53 |
Number of pages | 19 |
ISBN (Electronic) | 9781317908029 |
ISBN (Print) | 9780415732888 |
DOIs | |
Publication status | Published - 24 Mar 2015 |
Externally published | Yes |