Yellow banner with pen and letters

Author: Katharina Ziolkowski

Peacetime Regime for State Activities in Cyberspace

2013

The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the respective areas of expertise. Diplo's Dr Jovan Kurbalija contributed the chapter on E-diplomacy and Diplomatic Law in the Internet Era.
book-peacetime_1.jpg

To assist the reader’s orientation in cyberspace, the first part of this volume describes, in a comprehensive but accessible way, the sociological features and technical aspects of the internet and cyberspace. It explains the activities of State actors and their proxies, technical methods for remaining anonymous online and for back-tracing hackers, common cyber defense methods, techniques and tools, and the stages of hacking computer networks.

The second part offers an interpretation of public international law with regard to rights and obligations of States in the cyber realm. The topics covered range from the notion of territorial sovereignty in cyberspace through international aviation, space and economic law restrictions to matters of responsibility of States and international organizations for cyber activities.

The third part of the book elaborates on the interaction of States in cyberspace and governments’ means of counteracting malicious cyber activities. The agenda and challenges of cyber diplomacy, a due diligence standard for cyber security, the means of economic and political ‘cybered’ coercion, and legal remedies are presented.

The authors of the book are renowned experts selected from a wide range of backgrounds, including academia, supranational and international organizations, governmental and non-governmental entities, the civilian as well as the military sector. Together, they have created a work which is the first of its kind and will constitute a benchmark in the field for many years to come.

icon for right PDF

You may also be interested in

1200px-Flag_of_NATO.svg_.png

New threats: the cyber-dimension

The text discusses emerging cyber threats and the need for increased cybersecurity measures to address these new challenges.

book-peacetime_1.jpg

Peacetime Regime for State Activities in Cyberspace

The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the respective areas of expertise. Diplo's Dr Jovan Kurbalija contributed the chapter on E-diplomacy and Diplomatic Law in the Internet Era.

Barbara-Rosen-Jacobson.png

Searching for Meaningful Human Control. The April 2018 Meeting on Lethal Autonomous Weapons Systems (Briefing Paper #10)

In this briefing paper, Ms Barbara Rosen Jacobson analyses the debate of the April 2018 meeting of the Group of Governmental Experts (GGE) of the Convention on Certain Conventional Weapons (CCW). The group was established to discuss emerging technologies in the area of lethal autonomous weapons systems (LAWS).

Barbara-Rosen-Jacobson_diplo.png

Lethal Autonomous Weapons Systems: Mapping the GGE Debate (Briefing Paper #8)

The paper discusses the ongoing debate in the Group of Governmental Experts (GGE) on Lethal Autonomous Weapons Systems (LAWS) and the varying perspectives on the need for regulation and control of these weapons.

ModernDiplomacy.jpeg

The waning of the state and the waxing of cyberworld

This paper discusses whether IT is functioning mainly as an instrument of states in their quest for power and wealth or is principally operating as a transformative agent by market forces and various sectors of civil society.