Research Handbook on International Law and Cyberspace
Show Less

Research Handbook on International Law and Cyberspace

Edited by Nicholas Tsagourias and Russell Buchan

This timely Research Handbook contains an analysis of various legal questions concerning cyberspace and cyber activities and provides a critical account of their effectiveness. Expert contributors examine the application of fundamental international law principles to cyberspace such as sovereignty, jurisdiction, state responsibility, individual criminal responsibility, and intellectual property rights. In addition to this, they explore the application of international law rules to cyber terrorism, cyber espionage, cyber crime, cyber attacks and cyber war and discuss the cyber security policies of international and regional institutions.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 13: Some thoughts on cyber deterrence and public international law

Eric Myjer


The mention of a potential preventive US reaction with extremely powerful cyber weapons against the possibility of a cyber threat brings back memories of the early deterrence discussions with regard to nuclear weapons. What deterrence basically comes down to is making clear to any potential opponent that if you dare to attack me, you may expect, at a minimum, a reply in kind that will be devastating to your potential. It also includes the message that even if attacked my capacity to make such a reply will be preserved in a guaranteed second strike, so a first strike will not give any advantage. With regard to nuclear weapons the ICJ considered deterrence but did not conclude that the threat or use of nuclear weapons, which was the deterrent threat, was contrary to public international law in cases where the survival of the state was at stake. This is the reason to see whether indeed a parallel can be drawn between the deterrent strategies in the nuclear realm and a perceived cyber attack by a state in cyberspace and projected generic (preventive) replies by states to such threats, or attacks. Is such a deterrent strategy viable? Would importing deterrence in the cyber realm improve cyber security? And how does public international law qualify such deterrent strategy (is it in accordance with public international law)? These and other legal questions are prompted by the technological developments in the digital area that have created the possibilities for its use as new weapons.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.