The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2011 vol.9)
pp: 16-22
ABSTRACT
Recent cyberattacks, such as those carried out against Estonia and Georgia, have grayed the line between political hackers and legitimate combatants involved in cyberconflicts. There has been fierce debate as to whether these attacks are the independent acts of politically motivated individuals and groups or the strategic acts of states using covert methods to direct such actions to achieve larger political objectives. These attacks lead to many important questions but have yet to be answered in the international community. Under international agreements, can a computer attack truly be claimed as an armed attack? Are participants in these cyberattacks legitimate combatants, or are they merely politically motivated individuals who are breaking the law and should thus be treated as criminals under existing international agreements? This article explores these issues, the possible benefits and drawbacks of such actions, and the ramifications such cybermilitias might have on the current and future state of cyberconflicts.
INDEX TERMS
Cyberwarfare, cybermilitias, hacktivists, political hackers, cyberlaw
CITATION
Scott D. Applegate, "Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare", IEEE Security & Privacy, vol.9, no. 5, pp. 16-22, September/October 2011, doi:10.1109/MSP.2011.46
REFERENCES
1. C. Arnold, "Russian Group's Claims Reopen Debate on Estonian Cyberattacks," Radio Free Europe Radio Liberty, 28 Feb. 2011; www.rferl.org/content/Russian_Groups_Claims_Reopen_Debate_On_Estonian_Cyberattacks_ 1564694.html .
2. J. Wagley, "Researcher Says Russian Government Involved in Georgia Cyber Attacks," Security Management,22 Aug. 2008; www.securitymanagement.com/newsresearcher-says-russian-government-involved-georgia-cyber-attacks-004509 .
3. E. Morozov, "There Is No Need for Kremlin in This Hypothesis, or Why DDOS Is the New Poetry," Foreign Policy,17 Aug. 2009; http://neteffect.foreignpolicy.com/posts/ 2009/08/17there_is_no_need_for_kremlin_in_this_hypothesis .
4. M. Landler and J. Markoff, "Digital Fears Emerge after Data Seige in Estonia," The New York Times,29 May 2007; www.nytimes.com/2007/05/29/technology29estonia.html?_r=1&pagewanted=2 .
5. J. Carr, "Project Grey Goose Phase II Report: The Evolving State of Cyber Warfare," Greylogic, 2009; www.scribd.com/doc/13442963Project-Grey-Goose-Phase-II-Report .
6. T.L. Thomas, "Cyber Silhouettes: Shadows over Information Operations, Foreign Military Studies Office," 2005.
7. Munk Centre for Int'l Studies, "Tracking GhostNet: Investigating a Cyber Espionage Network,"29 Mar. 2009; www.f-secure.com/weblog/archivesghostnet.pdf .
8. L. Hoffman, "US Government Web Sites Attack by War Protesters," The Topeka Capital-J.,12 May 1999; http://cjonline.com/stories/051299new_webprotest.shtml .
9. R. Wallace, "It's an All-Out Cyber War as US Hacker Fight Back at China,"1 May 2001; www.foxnews.com/story0,2933,19337,00.html .
10. T.L. Thomas, Dragon Bytes: Chinese Information-War Theory and Practice, Foreign Military Studies Office, 2004.
11. J. Glanz and J. Markoff, "Vast Hacking by a China Fearful of the Web," The New York Times,10 Mar. 2010; www.nytimes.com/2010/12/05/world/asia05wikileaks-china.html?_r=1 .
12. UN General Assembly, "Resolution 3314: Definition of Aggression. Resolutions Adopted by the General Assembly during Its Twenty-Ninth Session," 2010; www.un.org/documents/ga/res/29ares29.htm .
13. Int'l Committee of the Red Cross, "Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), 8 June 1977," Int'l Humanitarian Law—Treaties and Documents, 2005; www.icrc.org/ihl.nsf/7c4d08d9b287a42141256739003e636b f6c8b9fee14a77fdc125641e0052b079 .
14. D.E. Denning, "The Ethics of Cyber Conflict," The Handbook of Information and Computer Ethics, K.E. Himma, and H.T. Tavani, eds., John Wiley and Sons, 2008.
15. T. Gjelten, "Extending the Law of War to Cyberspace," Nat'l Public Radio, 2010; www.npr.org/templates/storystory.php?storyId=130023318 .
16. H.E. Shamash, "How Much Is Too Much? An Examination of the Principle of Jus in Bello Proportionality," Israeli Defense Forces Law Rev., vol. 2, 2005–2006; http://papers.ssrn.com/sol3papers.cfm?abstract_id=908369 .
17. S. Watts, "Combatant Status and Computer Network Attack," Virginia J. International Law, vol. 5, no. 2, 2009; www.vjil.org/wp-content/uploads/2010/01VJIL-50.2-Watts.pdf .
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool