Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

SelectedWorks

MS Word

Grant Hodgson

Articles 1 - 1 of 1

Full-Text Articles in Law

Verification Methods In Cyber Attack Treaties, Grant Hodgson Feb 2016

Verification Methods In Cyber Attack Treaties, Grant Hodgson

Grant Hodgson

The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.