395
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Hackers of critical infrastructure: expectations and limits of the principle of target distinction

ORCID Icon
Pages 274-293 | Received 11 Oct 2022, Accepted 29 Dec 2022, Published online: 10 Jan 2023

References

  • Allianz. 2021. “Cyber attacks on critical infrastructure.”
  • BBC. 2021. “US fuel pipeline hackers ‘didn’t mean to create problems’ (May 10, 2021).
  • Chaudhary, Tarun, Jenna Jordan, Michael Salomone, and Phil Baxter. 2018. “Patchwork of Confusion: The Cybersecurity Coordination Problem.” Journal of Cybersecurity 4 (1).
  • Chertoff, Michael. 2018. Exploding Data Reclaiming Our Cyber Security in the Digital Age. New York: Grove.
  • CNN. 2021. “Hackers have a devastating new target” (June 4, 2021).
  • Couzigou, Irène. 2018. “Securing cyber space: the obligation of States to prevent harmful international cyber operations.” International Review of Law, Computers & Technology 32 (1).
  • Cyberscoop. 2021a. “Biden says he gave Putin list of 16 sectors that should be off-limits to hacking” (June 16, 2021).
  • Cyberscoop. 2021b. “Federal advisories detail bitcoin payments to ransomware gangs, urgency of threat” (March 24, 2021).
  • Cyberscoop. 2021c. “Meet DarkSide, the ransomware gang blamed for the Colonial Pipeline attack” (May 11, 2021).
  • Cyberscoop. 2021d. “Researchers find big flaw in a Schneider Electric ICS system popular in building systems, utilities” (July 13, 2021).
  • Cybersecurity and Infrastructure Security Agency. 2020. “Alert (AA20-049A): Ransomware Impacting Pipeline Operations (October 24, 2020).
  • The Daily Beast. 2021. “Ransomware Hackers May Be in Over Their Heads. They May Not Even Get Paid.” (July 7, 2021).
  • Decoded. 2021. “HackBoss: A cryptocurrency-stealing malware distributed through Telegram” (April 15, 2021).
  • Defense One. 2021. “US Companies Won’t Pay to Prepare for Cyber Attacks. Congress Must Step In” (June 21, 2021).
  • Delerue, François. 2020. François, Cyber Operations and International Law. Cambridge: Cambridge University Press.
  • Dinniss, Heather Harrison. 2012. Cyber Warfare and the Laws of War. Cambridge: Cambridge University Press.
  • Downes, Alexander. 2008. Targeting Civilians in War. Ithaca: Cornell University Press.
  • F5 Lab. 2021. “Application Protection Report Supplement: Sectors and Vectors” (June 23, 2021).
  • The Financial Times. 2021. “Hackers target US infrastructure after digitisation on the cheap” (May 21, 2021).
  • Finnemore, Martha, and Duncan Hollis. 2019. “Constructing Norms for Global Cybersecurity.” American Journal of International Law 110.
  • Fireeye. 2021. “Shining a Light on DARKSIDE Ransomware Operations” (May 11, 2021).
  • Gallais, Cecilia, and Eric Filiol. Winter 2017. “Critical Infrastructure: Where Do We Stand Today? A Comprehensive and Comparative Study of the Definitions of a Critical Infrastructure.” Journal of Information Warfare 16 (1).
  • Geiss, Robin, and Henning Lahmann. 2012. “Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space.” Israel Law Review 45 (3).
  • Gisel, Laurent, Tilman Rodenhäuser, and Knut Dörmann. September 2020. “Twenty Years on: International Humanitarian law and the Protection of Civilians Against the Effects of Cyber Operations During Armed Conflicts.” International Review of the Red Cross.
  • Government of Japan, Cybersecurity Strategic Headquarters. 2019. “Guideline for Establishing Safety Principles for Ensuring Information Security of Critical Infrastructure. 5th ed. (April 4, 2019).
  • The Hacker News. 2021. “DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months” (May 19, 2021).
  • Hathaway, Oona, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Persue, and Julia Spiegel. 2011. “The Law of Cyber-Attack.” California Law Review 100 (4).
  • Herr, Trey, et al. March 29, 2021. “Broken Trust: Lessons from Sunburst.” The Atlantic Council.
  • International Committee of the Red Cross. “Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts” (May 26, 2021).
  • Jensen, Eric Talbot, and Sean Watts. Due Diligence and the U.S. Defend Forward Cyber Strategy,” J.Reuben Clark Law School, Brigham Young University Research Paper, No. 20-24.
  • Jhangiani, Tasha, and Graham Kennis. “Protecting the Critical of Critical: What Is Systemically Important Critical Infrastructure?” Lawfare (June 15, 2021).
  • Kaempf, Sebastian. 2018. Saving Soldiers or Civilians? Casualty-Aversion Versus Civilian Protection in Asymmetric Conflicts. Cambridge: Cambridge University Press.
  • Katagiri, Nori. 2021. “Why International Law and Norms Do Little in Preventing Non-State Cyber Attacks.” Journal of Cybersecurity 7 (1).
  • Kazakova, Anastasiya. November 16, 2020. “Hurdles to Protecting Global Critical Infrastructure.” Directions Cyber Digital Europe.
  • Kelsey, Jeffrey. 2008. “Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare.” Michigan Law Review 106 (7).
  • Kettemann, Matthias. 2020. The Normative Order of the Internet: A Theory of Rule and Regulation Online. Oxford: Oxford University Press.
  • Korzak, Elaine. September 23, 2015. “The 2015 GGE Report: What Next for Norms in Cyberspace?” Lawfare.
  • Krcmaric, Daniel. June 2019. “Information, Secrecy, and Civilian Targeting.” International Studies Quarterly 63 (2).
  • Lin, Herbert. 2010. “Offensive Cyber Operations and the Use of Force.” Journal of National Security Law and Policy 4 (1).
  • Macak, Kubo. 2017. “From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers.” Leiden Journal of International Law 30.
  • Mavropoulou, Elizabeth. Spring 2015. “Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks.” Journal of Law & Cyber Warfare 4 (2).
  • Moynihan, Harriet. 2020. “The vital role of international law in the framework for responsible state behaviour in cyberspace.” Journal of Cyber Policy.
  • Narayanan, Anu, et al. 2020. Deterring Attacks Against the Power Grid: Two Approaches for the U.S. Department of Defense. Santa Monica, CA: RAND Corporation.
  • Narayanan, Anu, and Jonathan Welburn. May 18, 2021. “Is DarkSide Really Sorry? Is It Even DarkSide?” Defense One.
  • NATO Cooperative Cyber Defence Centre of Excellence. 2013. “United Nations Group of Governmental Experts Achieve a ‘Landmark Consensus’” (2013).
  • NATO Cooperative Cyber Defence Centre of Excellence. 2019. “Strategic importance of, and dependence on, undersea cables” (November 2019).
  • The New York Times. 2021. “Secret Chats Show How Cybergang Became a Ransomware Powerhouse” (May 30, 2021).
  • Nye, Joseph. Winter 2016/17. “Deterrence and Dissuasion in Cyberspace.” International Security 41 (3).
  • OECD. 2019. Good Governance for Critical Infrastructure Resilience, OECD Reviews of Risk Management Policies. Paris: OECD Publishing.
  • Optiv Security. 2019. Cyber Threat Intelligence Estimate. Denver.
  • Osula, Anna-Maria, and Henry Rõigas. 2016. International Cyber Norms: Legal, Policy & Industry Perspectives. Tallinn, Estonia: NATO CCD COE.
  • Pursiainen, Christer. 2021. “Russia’s Critical Infrastructure Policy: What do we Know About it?” European Journal for Security Research 6.
  • Rona, Gabor, and Lauren Aarons. 2016. “State Responsibility to Respect, Protect and Fulfill Human Rights Obligations in Cyberspace.” Journal of National Security Law and Policy 8 (3).
  • Saladin, Claudia. 2000. “Precautionary Principle in International Law.” International Journal of Occupational and Environmental Health 6 (4).
  • Schmitt, Michael. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.
  • Schmitt, Michael, and Sean Watts. 2016. “Beyond State-Centrism: International law and non-State Actors in Cyberspace.” Journal of Conflict and Security Law 21 (3).
  • Stanton, Jessica. 2016. Violence and Restraint in Civil War: Civilian Targeting in the Shadow of International Law. Cambridge: Cambridge University Press.
  • Stergiopoulos, George, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, and Dimitris Gritzalis. 2016. “Classification and Comparison of Critical Infrastructure Protection Tools.” 10th International Conference on Critical Infrastructure Protection (ICCIP) (Arlington, VA, 2016).
  • Tanaka, Yoshifumi. 2019. The International Law of the Sea. Cambridge: Cambridge University Press.
  • Traven, David. 2021. Law and Sentiment in International Politics: Ethics, Emotions, and the Evolution of the Laws of War. Cambridge: Cambridge University Press.
  • The Wall Street Journal. 2021. “Beyond Colonial Pipeline, Ransomware Cyberattacks Are a Growing Threat” (May 11, 2021).
  • The Washington Post. 2021. “Ransomware attacks could reach ‘pandemic’ proportions. What to know after the pipeline hack” (May 2021).
  • Webster, Graham, Samm Sacks, and Paul Triolo. April 2, 2019. Three Chinese Digital Economy Policies at Stake in the U.S.-China Talks. New America.
  • Wenger, Andreas, and Simon Mason. 2008. “The Civilianization of Armed Conflict: Trends and Implications.” International Review of Red Cross 90 (872).
  • Wired Magazine. 2020. “The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet” (May 12, 2020).
  • Wood, Reed, and Jacob Kathman. 2013. “Too Much of a Bad Thing? Civilian Victimization and Bargaining in Civil War.” British Journal of Political Science 44 (3).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.