Cyber Defence Library

Peacetime Regime for State Activities in Cyberspace

Peacetime Regime for State Activities in Cyberspace

The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the respective areas of expertise.

To assist the reader’s orientation in cyberspace, the first part of this volume describes, in a comprehensive but accessible way, the sociological features and technical aspects of the internet and cyberspace. It explains the activities of State actors and their proxies, technical methods for remaining anonymous online and for back-tracing hackers, common cyber defence methods, techniques and tools, and the stages of hacking computer networks. The second part offers an interpretation of public international law with regard to rights and obligations of States in the cyber realm. The topics covered range from the notion of territorial sovereignty in cyberspace through international aviation, space and economic law restrictions to matters of responsibility of States and international organisations for cyber activities. The third part of the book elaborates on the interaction of States in cyberspace and governments’ means of counteracting malicious cyber activities. The agenda and challenges of cyber diplomacy, a due diligence standard for cyber security, the means of economic and political ‘cybered’ coercion, and legal remedies are presented.

The authors of the book are renowned experts selected from a wide range of backgrounds, including academia, supranational and international organisations, governmental and non-governmental entities, the civilian as well as the military sector, including Prof. Dr Chris C. Demchak, Prof. Dr Wolff Heintschel von Heinegg, Prof. Dr Jan Klabbers, Prof. Dr Thilo Marauhn, Dinah PoKempner, Prof. Dr Michael N. Schmitt, Heli Tiirmaa-Klaar, Prof. Dr Ian Walden and many others. Together, they have created a work which is the first of its kind and will constitute a benchmark in the field for many years to come.

Book details:
Editor: Dr Katharina Ziolkowski (NATO CCD COE)
Hardcover: 746 pages
Publisher: NATO CCD COE Publications, December 2013
Language: English
ISBN (print): 978-9949-9211-7-1 
ISBN (PDF): 978-9949-9211-8-8 
ISBN (ePub): 978-9949-9211-9-5 

 

Table of Contents:

Part 1 – Introduction to Cyberspace – Sociological Facets and Technical Features 
State Actors and Their Proxies in Cyberspace 
Back-Tracing and Anonymity in Cyberspace
Technical Defence Methods, Tools, Techniques and Effects
Technical Methods, Techniques, Tools and Effects of Cyber Operations

Part 2 – Rights and Obligations of States in Cyberspace
General Principles of International Law as Applicable in Cyberspace
Territorial Sovereignty and Integrity and the Challenges of Cyberspace
Non-Intervention in the Cyber Context
Cyberspace and State Obligations in the Area of Human Rights 
International and Regional Telecommunications Law
Space Law and Unauthorised Cyber Activities 
Legal Protection of Civil and Military Aviation against Cyber Interference
Protecting Critical Submarine Cyber Infrastructure: Legal Status and Protection of Submarine  
   Communications Cables under International Law
E-diplomacy and Diplomatic Law Implications
Cyber-Espionage – New Tendencies in Public International Law
International Economic Law in the Cyber Arena
Customary Rules of International Environmental Law
Responsibility of States and International Organizations in the Context of Cyber Activities with 
   Special Reference to NATO

Part 3 – State Interaction and Counteraction in Cyberspace 
Cyber Diplomacy: Agenda, Challenges and Mission
Confidence Building Measures for Cyberspace
International Cyber Crisis Management and Conflict Resolution Mechanisms
Economic and Political Coercion and a Rising Cyber Westphalia
Freedom and Security in Cyberspace: Shifting the Focus away from Military Responses towards 
   Non-Forcible Countermeasures and Collective Threat-Prevention
Cyber Activities and the Law of Countermeasure