Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 7 Discussion 1 Cyberwar and the Law of Armed Conflict

Module 7 Discussion 1 Cyberwar and the Law of Armed Conflict

Q Module 7 To the People of the United States, Senators and Representatives in Congress: Having had the honor conferred upon me of appointment by the Central Commission holding the Geneva Convention to present that treaty to this Government, and to take in charge the formation of a National organization according to the plan pursued by the committees working under the treaty, it seems to me but proper, that while I ask the Government to sign it, the people and their representatives should be made acquainted with its origin, designs, methods of work, etc. To this end I have prepared the following statement, and present it to my countrymen and women, hoping they will be led to indorse and sustain a benevolence so grand in its character, and already almost universal in its recognition and adoption by the civilized world. CLARA BARTON, Washington, D.C. Read more from “The Red Cross of the Geneva Convention. What it is (Links to an external site.) Developing a consensus definition for cyberwar has proved difficult. The lines between war, espionage, and criminal activity are often unclear. In this discussion you will be required to develop your own definition of cyberwar and how that definition may be limited. With that understanding you will be asked to place cyberwar in context with the Law of Armed Conflict. As always be mindful of plagiarism. The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance. The module learning outcomes addressed in this activity are: • Explain different views of cyberwar (CO #1, #4) • Discuss the application of the Law of Armed Conflict to cyberwar (CO #1, #4) • Provide examples of cyber conflict and its influence on international relations (CO #1, #4) • Explain the attribution problem and its implications for cyberwar (CO #1, #4) The input of each student adds value to the course and creates a better experience for everyone. Although this is an online asynchronous course that you can access on your own schedule, your regular participation is mandatory. You will be expected to log in and participate at least two times per week on separate days throughout the term. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Please contribute at least one original post, due on Wednesday at 11:59 p.m. Eastern time, with at least two substantive replies to fellow students posted by Sunday at 11:59 p.m. Eastern time. Keep in mind that if reply posts come in Sunday evening, this is not a robust discussion. I reserve the right to ask you to contribute sooner or more frequently if this will enhance learning. Question After completing the assigned readings for the module and review of the video segment defining cyber warfare (Links to an external site.), please respond to the following question in your initial post: • At what point does a cyberattack on critical national infrastructure that could result in deaths or significant damage to a nation’s economy constitute an armed attack and allow for a nation to take offensive action in its defense? What are the limits of the response? Please cite course materials and/or outside research to support your conclusions. Response: Your replies to classmates must be substantive; posting “I agree” is a start, but you also need to explain why. Replies should contribute to the discussion as a whole by integrating what you have learned from your required readings. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Consult the Discussion Posting Guide for information about writing your discussion posts. It is recommended that you write your post in a document first. Check your work and correct any spelling or grammatical errors. This is a “post first” discussion forum, which means you must submit your initial post before you can view other students’ posts. When you are ready to make your initial post, click on "Reply." Then copy/paste the text into the message field, and click “Post Reply.” To respond to a peer, click “Reply” beneath her or his post and continue as with an initial post.

View Related Questions

Solution Preview

There cannot be many differences found out with different kinds of cyber-attacks associated with being categorized as armed attack. There can be a legal classification imposed on a specific type of cyber-attack. However, such a classification might be considered to be common for different cyber-attacks because of the commonalities of the utilization of weapons of cyber-attacks like malware (Garrie). If the legal consequences of the cyber-attacks are different, then there can be differentiation made between/among the armed cyber-attacks with utilization of specific cyber-weapons. There can be the development of controversies in case of an armed response when there is an individual committing cyber-crimes within the state of the country (Garrie).