Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyberwarfare
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The paper is presenting the examination of the cyberwarfare phenomenon in its legal context. The cyberattacks are increasingly effective measures of modern combat and would probably become the most crucial dimension of forthcoming armed conflict. The role of the international humanitarian law is to determine whenever the cyberattack is reaching the threshold of an armed conflict. The aim of the article is to present the existing framework of ius in bello in terms of its temporal scope of applicability, especially in the light of the Tallinn Manual on the International Law Applicable to Cyber Warfare. It supported conclusion that the international law requires an revision of the armed conflict definition to sufficiently addressed the challenges arising from growing cyber activity.
EN
The rising pace of technological development in the 21st century is frequently met by a widespread "folly", to be always up-to-date with the latest trends and fashions, especially in the sensitive and ever changing area of IT. Humanity continues to develop numerous indispensable and useful technological innovations, but concurrently produces numerous inventions whose implementation in various spheres of human life must give rise to objections. We observe an increasing flood of technological innovations and a blind assimilation of all electronic devices, including some which appear to be completely unnecessary. Almost no one asks: where are the boundaries and at what point do hi-tech pursuits cease to make sense? The pace and scope of development raises legitimate doubts, as it is outpacing the growth of deepened intellectual reflection. Therefore, this paper argues that the more ICTs are introduced thoughtlessly into different areas of life, the greater the challenges, resulting from their improper use, we face. Such correlation is visible at a glance, but so far there has been little effort to understand the causes and strategic consequences of this profound paradox of digital revolution.
EN
Cyberspaces can be significantly influenced by simple tools and tactics, and offer cost-effective solutions for states to achieve their objectives. However, it can also be used for conducting cyberwarfare, and its effects remain in gray areas. The spectrum of cyberwarfare activities ranges from minor web disruptions to crippling attacks on critical national infrastructures. Nevertheless, cyberattacks present a unique challenge in applying well-established humanitarian legal principles, particularly regarding the distinction between civilian and military targets. This is because of the interconnectedness and shared infrastructure of cyberspace between civilian and military entities, which blurs the lines between combatants and civilian populations. This article seeks to shift the general perception of the problems associated with this manner of conducting hostilities by building on the learning of the Russian-Ukrainian conflict. Furthermore, the authors examine the cyber activities that occurred during the conflict and the legal and ethical challenges that arise from classifying these activities and applying international law. They try to distinguish cyber activities as an act of force or armed attack, with a focus on determining the criteria that played a role in this classification, in light of Articles 2 (4) and 51 of the UN Charter. With reference to the United Nations (UN) Charter and the principles of self-defence, the concept of attack is scrutinised. Furthermore, the article addresses the principles of distinction and proportionality in relation to qualified cyber activities as an armed attack in the same conflict, emphasising the importance of the principle of proportionality in assessing cyber warfare.
EN
The aim of this article is to present the genesis and typology of cyberspace and the threats that result from activities carried out in this area by state and non-state entities. The basic concepts, especially cyberspace, which is treated as a potential new theater of war, have been systematized. It was also presented the characteristics of the studied phenomenon from the point of view of using it to carry out destructive activities in the digital space and in the real world. Cyberspace is becoming an area for carrying out effective activities that serve to neutralize the enemy in a short time and with little effort. To prove his theses, the author uses numerous examples from the actual international relations, such as: the cyberwarfare in Estonia, the Israeli-American operations against Iranian ICT systems and the cyber-clashes between the United States of America and China.
PL
Celem artykułu jest przedstawienie genezy cyberprzestrzeni oraz typologii zagrożeń związanych z działaniami prowadzonymi w tej sferze zarówno przez podmioty państwowe, jak i pozapaństwowe. Dokonano systematyzacji pojęć z zakresu cyberbezpieczeństwa, zwłaszcza cyberprzestrzeni, która jest traktowana jako nowy teatr wojny, oraz zaprezentowano, jakie właściwości omawianego zjawiska mogą zostać wykorzystane do prowadzenia działań destrukcyjnych w przestrzeni cyfrowej oraz w świecie rzeczywistym. Cyberprzestrzeń staje się dogodnym obszarem do realizacji efektywnych działań, które służą unieszkodliwieniu przeciwnika w krótkim czasie i przy niewielkim nakładzie sił. Autor omówił przykłady realizacji takich działań z pierwszych dwóch dekad XXI w.: cyberwojnę w Estonii, izraelsko-amerykańskie operacje przeciwko irańskim systemom teleinformatycznym oraz cyberstarcia Stanów Zjednoczonych Ameryki z Chinami.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.