The Contours of 'Defend Forward' Under International Law

被引:0
作者
Kosseff, Jeff [1 ]
机构
[1] US Naval Acad, Cyber Sci Dept, Annapolis, MD 21402 USA
来源
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE | 2019年
关键词
cybersecurity; countermeasures; defense; espionage; retorsion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2018, United States Cyber Command announced a new operational concept to "defend forward" against other states whose cyber operations against the United States have been hostile, but short of an armed attack. Defend Forward supports the U.S. strategy of persistent engagement, which recognizes the need to continuously engage to inhibit incessant adversarial cyber operations against the United States. Although the public Defend Forward description was short on details, it consists of three general components: (1) positioning to degrade cyber operations; (2) warning to gather information about threats and inform defenses; and (3) influencing adversaries to discourage them from deploying cyber operations against the United States. In the year since the announcement of the Defend Forward concept, there has been vital debate about whether the United States should defend forward. This paper examines a related but distinct question: Could the United States defend forward under international law, and if so, what limits does the law impose? This paper concludes that international law provides the United States with significant leeway to position itself to degrade adversaries' cyber operations, gather information about cyber threats, and discourage other states from acting against the United States in cyberspace. Although international law imposes vital limits on operational concepts such as Defend Forward, there is a significant gap between those boundaries and how the United States has defended against cyber aggression short of armed conflict.
引用
收藏
页码:307 / 319
页数:13
相关论文
共 40 条
  • [1] Anderson Troy, 2016, ARIS J INT COMPL L, V34, P135
  • [2] [Anonymous], 2014, VA J INT LAW
  • [3] [Anonymous], 2001, DRAFT ARTICLES RESPO, P75
  • [4] [Anonymous], 2011, DEP DEFENSE STRATEGY, P7
  • [5] [Anonymous], GEN MOD RESP SYNCT V
  • [6] [Anonymous], 2015, DEP DEFENSE CYBER ST, P10
  • [7] [Anonymous], 2013, REUTERS
  • [8] Barela Steven, 2018, ZERO SHADES GREY RUS
  • [9] Barnes Julian E., 2018, NY TIMES
  • [10] Ben Buchanan, 2018, IMPLICATIONS DEFENDI