This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using ... View more
Albright, David, Paul Brannan, and Christina Walrond. “Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?” Institute for Science and International Security Report (December 22, 2010): 1-10 // http://isisonline.org/uploads/isis-reports/documents/stuxnet_FEP_22Dec2010.pdf.
Anderson, Michael. “Reconceptualizing Aggression.” Duke Law Journal 60 (2010): 411-456.
Antolin-Jenkins, Vida M. “Defining the Parameters of Cyber War Operations: Looking for Law in All the Wrong Places?” Naval Law. Rev. 51 (2005): 132- 169.
Baker, Stewart, McAfee, Inc. “In the Crossfire: Critical Infrastructure in the Age of Cyber War” (2009) // http://newsroom.mcafee.com/images/10039/In%20the%20Crossfire_CIP%20 report.pdf.
Barkham, Jason. “Information Warfare and International Law on the Use of Force.” N.Y.U. J. Int'l L. & Pol. 34 (2001): 57-114.
6. Billo, Charles G., and Welton Chang. Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States. Institute for Security Technology Studies, 2004.
7. Blank, Laurie R. “Taking Distinction to the Next Level: Accountability for Fighters' Failure to Distinguish Themselves from Civilians.” Valparaiso University Law Review 46(3) (2012): 745-887.
8. Brenner, Susan W. “Is There Such a Thing as 'Virtual Crime'?” Cal. Crim. L. Rev. 4 (2001): 1-18.
9. Brenner, Susan W. and Leo L. Clarke, “Civilians in Cyber Warfare: Conscripts,” Vanderbilt Journal of Transnational Law 43 (2010): 1011-1076.
10. Brenner, Susan. “At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare.” J. Crim. Law & Criminology 97 (2007): 363- 381.